IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Case-based planning: viewing planning as a memory task
Case-based planning: viewing planning as a memory task
A Neural Network for PCA and Beyond
Neural Processing Letters
New approximations of differential entropy for independent component analysis and projection pursuit
NIPS '97 Proceedings of the 1997 conference on Advances in neural information processing systems 10
The rectified Gaussian distribution
NIPS '97 Proceedings of the 1997 conference on Advances in neural information processing systems 10
Intrusion detection using autonomous agents
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
Hybrid Intelligent Systems
Connectionist-Symbolic Integration: From Unified to Hybrid Approaches
Connectionist-Symbolic Integration: From Unified to Hybrid Approaches
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
A Survey on Case-Based Planning
Artificial Intelligence Review
Anomaly Detection Using Visualization and Machine Learning
WETICE '00 Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
Case-Based Reasoning for Intrusion Detection
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
HAPTICS '02 Proceedings of the 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems
Enhancing byte-level network intrusion detection signatures with context
Proceedings of the 10th ACM conference on Computer and communications security
Developing multiagent systems: The Gaia methodology
ACM Transactions on Software Engineering and Methodology (TOSEM)
Unsupervised learning techniques for an intrusion detection system
Proceedings of the 2004 ACM symposium on Applied computing
Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit
Data Mining and Knowledge Discovery
Feature selection of intrusion detection data using a hybrid genetic algorithm/KNN approach
Design and application of hybrid intelligent systems
Scatter (and other) plots for visualizing user profiling data and network traffic
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
Job Completion Prediction in Grid Using Distributed Case-based Reasoning
WETICE '05 Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise
Complexity Pursuit: Separating Interesting Components from Time Series
Neural Computation
D-SCIDS: distributed soft computing intrusion detection system
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Hybrid multi-agent architecture as a real-time problem-solving model
Expert Systems with Applications: An International Journal
A Projection Pursuit Algorithm for Exploratory Data Analysis
IEEE Transactions on Computers
Best hybrid classifiers for intrusion detection
Journal of Computational Methods in Sciences and Engineering - Selected papers from the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications, 2004
Adaptive load balancing: a study in multi-agent learning
Journal of Artificial Intelligence Research
A linear genetic programming approach to intrusion detection
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartII
A comparison of neural projection techniques applied to intrusion detection systems
IWANN'07 Proceedings of the 9th international work conference on Artificial neural networks
Detecting compounded anomalous SNMP situations using cooperative unsupervised pattern recognition
ICANN'05 Proceedings of the 15th international conference on Artificial neural networks: formal models and their applications - Volume Part II
Testing CAB-IDS through mutations: on the identification of network scans
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Learning intrusion detection: supervised or unsupervised?
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
A mobile agent approach to intrusion detection in network systems
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Interactive visualization for network and port scan detection
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
MOVICAB-IDS: visual analysis of network traffic data streams for intrusion detection
IDEAL'06 Proceedings of the 7th international conference on Intelligent Data Engineering and Automated Learning
Hierarchical Kohonenen net for anomaly detection in network security
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
IEEE Network: The Magazine of Global Internetworking
A Hybrid Solution for Advice in the Knowledge Management Field
HAIS '09 Proceedings of the 4th International Conference on Hybrid Artificial Intelligence Systems
A forecasting solution to the oil spill problem based on a hybrid intelligent system
Information Sciences: an International Journal
On-line valuation of residential premises with evolving fuzzy models
HAIS'11 Proceedings of the 6th international conference on Hybrid artificial intelligent systems - Volume Part I
Detecting unknown attacks in wireless sensor networks using clustering techniques
HAIS'11 Proceedings of the 6th international conference on Hybrid artificial intelligent systems - Volume Part I
An evidential fusion architecture for people surveillance in wide open areas
HAIS'11 Proceedings of the 6th international conference on Hybrid artificial intelligent systems - Volume Part I
MINI: a 3D mobile image browser with multi-dimensional datasets
Proceedings of the 27th Annual ACM Symposium on Applied Computing
RT-MOVICAB-IDS: Addressing real-time intrusion detection
Future Generation Computer Systems
Engineering Applications of Artificial Intelligence
Hi-index | 0.01 |
A novel hybrid artificial intelligent system for intrusion detection, called MObile-VIsualization Hybrid IDS (MOVIH-IDS), is presented in this study. A hybrid model built by means of a multiagent system that incorporates an unsupervised connectionist intrusion detection system (IDS) has been defined to guaranty an efficient computer network security architecture. This hybrid IDS facilitates the intrusion detection in dynamic networks, in a more flexible and adaptable manner. The proposed improvement of the system in this paper includes deliberative agents characterized by the use of an unsupervised connectionist model to identify intrusions in computer networks. This hybrid IDS has been probed through several real anomalous situations related to the simple network management protocol as it is potentially dangerous. Experimental results probed the successful detection of such attacks through MOVIH-IDS.