作者: Evangelos Morakis , Michael Pilgermann , Stilianos Vidalis , Andrew Blyth , Jerzy Dobrodziej
DOI:
关键词:
摘要: This paper will discuss G4DS, a technology that make GRIDs attractive to enterprises across all the different fields of computing. It help uptake GRID type architectures and extend their concept from computational GRIDS knowledge GRIDS. The centre gravity G4DS is design implement core allow development applications offering groundbreaking solutions complex problems in information security, which cannot be solved with present technologies. application effectively police cyberspace minimise threats against computing infrastructures. presents IO-IDS greatly enhance functionality Intrusion Detection Systems. 1. Problem Statement In our modern electronic world, securing large-scale environment can seen as problem requires lot resources intensive power. Organisations are forced allocate considerable protecting assets but statistics [7] indicate there no stopping hacking activities. We believe security only achieved through effective policing. One tool for “policing” cyber-world Systems (IDS). Over last decade, IDSs have become increasingly important protection computer networks. Apart other evolutions IDS area such everlasting new detection mechanisms [14], generalisation [15] aggregation [17] alerts, tendency implementing Enterprise has conspicuous. What we need an automated able detect, deter react any illegal cyber activity. Such offered by presented this paper. world. [6] computation manage [10], [19], [16], [10] [5], [8], [18], [2] Defending European IT infrastructure network-based attack involving data analysis sharing [20]. Current technologies do not easily facilitate flow organisational political boundaries. Consequently many organisations face intrusions into systems little same supply chain. There defenders Information Infrastructure (EII) come together form number communities order take actions collectively perpetrator attack, promote culture amongst members these These should secure proactive defending networks ongoing attacks.