Skip to main content
Article
NIDH - Network Intrusion Detection Hierarchy: A model for gathering attack intelligence
ECU Publications Pre. 2011
  • Craig Valli, Edith Cowan University
Publication Date
1-1-2001
Document Type
Journal Article
Publisher
Teamlink Pty Ltd
Faculty
Business and Public Management
School
Business
RAS ID
52
Comments
This article was originally published as: Valli, C. (2001). NIDH - Network Intrusion Detection Hierarchy: A model for gathering attack intelligence. Journal of Information Warfare, 1(1), 42-49. Original article available here
Abstract

Internet proxy systems such as Squid exchange intelligence relevant to their function as caching proxy servers via a distributed and trusted hierarchy of machines. The required intelligence is broadcast based along the network based upon established trust relationships throughout the connected network via specific port and protocols of exchange. An intrusion detection system that incorporates this functionality for gathering attack intelligence could be a formidable foe even for the wiliest attacker. This paper will outline a possible model for the deployment of a network/distributed network intrusion detection system utilising technologies and techniques already in existence to provide the supporting infrastructure.

Citation Information
Craig Valli. "NIDH - Network Intrusion Detection Hierarchy: A model for gathering attack intelligence" (2001)
Available at: http://works.bepress.com/craig_valli/46/