Streams, security and scalability

Theodore Johnson, Shanmugavelayutham Muthukrishnan, Oliver Spatscheck, Divesh Srivastava

    Research output: Contribution to journalConference article

    Abstract

    Network-based attacks, such as DDoS attacks and worms, are threatening the continued utility of the Internet. As the variety and the sophistication of attacks grow, early detection of potential attacks will become crucial in mitigating their impact. We argue that the Gigascope data stream management system has both the functionality and the performance to serve as the foundation for the next generation of network intrusion detection systems.

    Original languageEnglish (US)
    Pages (from-to)1-15
    Number of pages15
    JournalLecture Notes in Computer Science
    Volume3654
    StatePublished - Oct 19 2005
    Event19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security - Storrs, CT, United States
    Duration: Aug 7 2005Aug 10 2005

    Fingerprint

    Intrusion detection
    Scalability
    Attack
    Internet
    DDoS
    Network Intrusion Detection
    Worm
    Data Streams

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • Computer Science(all)

    Cite this

    Johnson, T., Muthukrishnan, S., Spatscheck, O., & Srivastava, D. (2005). Streams, security and scalability. Lecture Notes in Computer Science, 3654, 1-15.

    Streams, security and scalability. / Johnson, Theodore; Muthukrishnan, Shanmugavelayutham; Spatscheck, Oliver; Srivastava, Divesh.

    In: Lecture Notes in Computer Science, Vol. 3654, 19.10.2005, p. 1-15.

    Research output: Contribution to journalConference article

    Johnson, T, Muthukrishnan, S, Spatscheck, O & Srivastava, D 2005, 'Streams, security and scalability', Lecture Notes in Computer Science, vol. 3654, pp. 1-15.
    Johnson T, Muthukrishnan S, Spatscheck O, Srivastava D. Streams, security and scalability. Lecture Notes in Computer Science. 2005 Oct 19;3654:1-15.
    Johnson, Theodore ; Muthukrishnan, Shanmugavelayutham ; Spatscheck, Oliver ; Srivastava, Divesh. / Streams, security and scalability. In: Lecture Notes in Computer Science. 2005 ; Vol. 3654. pp. 1-15.
    @article{2b7ea3461f7b4cfe8faa29b90f67f79f,
    title = "Streams, security and scalability",
    abstract = "Network-based attacks, such as DDoS attacks and worms, are threatening the continued utility of the Internet. As the variety and the sophistication of attacks grow, early detection of potential attacks will become crucial in mitigating their impact. We argue that the Gigascope data stream management system has both the functionality and the performance to serve as the foundation for the next generation of network intrusion detection systems.",
    author = "Theodore Johnson and Shanmugavelayutham Muthukrishnan and Oliver Spatscheck and Divesh Srivastava",
    year = "2005",
    month = "10",
    day = "19",
    language = "English (US)",
    volume = "3654",
    pages = "1--15",
    journal = "Lecture Notes in Computer Science",
    issn = "0302-9743",
    publisher = "Springer Verlag",

    }

    TY - JOUR

    T1 - Streams, security and scalability

    AU - Johnson, Theodore

    AU - Muthukrishnan, Shanmugavelayutham

    AU - Spatscheck, Oliver

    AU - Srivastava, Divesh

    PY - 2005/10/19

    Y1 - 2005/10/19

    N2 - Network-based attacks, such as DDoS attacks and worms, are threatening the continued utility of the Internet. As the variety and the sophistication of attacks grow, early detection of potential attacks will become crucial in mitigating their impact. We argue that the Gigascope data stream management system has both the functionality and the performance to serve as the foundation for the next generation of network intrusion detection systems.

    AB - Network-based attacks, such as DDoS attacks and worms, are threatening the continued utility of the Internet. As the variety and the sophistication of attacks grow, early detection of potential attacks will become crucial in mitigating their impact. We argue that the Gigascope data stream management system has both the functionality and the performance to serve as the foundation for the next generation of network intrusion detection systems.

    UR - http://www.scopus.com/inward/record.url?scp=26444585966&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=26444585966&partnerID=8YFLogxK

    M3 - Conference article

    VL - 3654

    SP - 1

    EP - 15

    JO - Lecture Notes in Computer Science

    JF - Lecture Notes in Computer Science

    SN - 0302-9743

    ER -