Network monitoring and analysis: a protocol approach to troubleshooting
Network monitoring and analysis: a protocol approach to troubleshooting
Intrusion detection using autonomous agents
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
An Architecture for Intrusion Detection Using Autonomous Agents
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
The Tao Of Network Security Monitoring: Beyond Intrusion Detection
The Tao Of Network Security Monitoring: Beyond Intrusion Detection
Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
D-SCIDS: distributed soft computing intrusion detection system
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
A multi-agent system for computer network security monitoring
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
Agent-Based approach for distributed intrusion detection system design
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part III
A mobile agent approach to intrusion detection in network systems
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Anomaly detection system based on service oriented architecture
ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part III
Hi-index | 0.00 |
In this paper an original method for intrusion detection used by the multi-agent monitoring system is proposed. Due to the complexity of the problem of the network security maintaining it is a good idea to apply the multi-agent approach. The multi-agent system is used in the tasks of computer network monitoring in order to detect the security policy violations. In this paper the algorithm for detecting some type of attack is proposed. This algorithm is based on the network traffic analysis.