Agent-Based Model of Computer Network Security System: A Case Study
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Applications of agent technology in communications: a review
Computer Communications
MIC'06 Proceedings of the 25th IASTED international conference on Modeling, indentification, and control
On Some Method for Intrusion Detection Used by the Multi-agent Monitoring System
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part III
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
A multi-agent system for computer network security monitoring
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
Agent-Based approach for distributed intrusion detection system design
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part III
Assessing the uncertainty of communication patterns in distributed intrusion detection system
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Traffic pattern analysis for distributed anomaly detection
PPAM'11 Proceedings of the 9th international conference on Parallel Processing and Applied Mathematics - Volume Part II
RT-MOVICAB-IDS: Addressing real-time intrusion detection
Future Generation Computer Systems
Hi-index | 0.00 |
A major problem with current approaches to the automatic intrusion detection is that it is difficult to make a difference between a normal user behaviour and potential attacker. In this case it is very difficult to conduct investigations of attacks without human intervention. In this paper a framework of an original proposal of the multi-agent system is presented. The aim of this system is security evaluation of the network system on the basis of intrusions pattern scenarios matching. Mechanism of intrusions' detection and defining new attacks' templates are introduced. In this proposal soft methods of computing, advanced methods of symbolic knowledge representation and the methods of semantic communication are used.