The blackboard model of problem solving
AI Magazine
Case-based planning: viewing planning as a memory task
Case-based planning: viewing planning as a memory task
Addressing real-time constraints in the design of autonomous agents
Real-Time Systems
A survey of research in deliberative real-time artificial intelligence
Real-Time Systems
Visual information seeking: tight coupling of dynamic query filters with starfield displays
Readings in information visualization
Intrusion detection using autonomous agents
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
Real-Time Systems: Design Principles for Distributed Embedded Applications
Real-Time Systems: Design Principles for Distributed Embedded Applications
An artificial immune system model for intelligent agents
Future Generation Computer Systems - Special issue on bio-impaired solutions to parallel processing problems
Towards a real-time architecture for time-aware agents
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Intrusion Signatures and Analysis
Intrusion Signatures and Analysis
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
Identifying enterprise network vulnerabilities
International Journal of Network Management
A Survey on Case-Based Planning
Artificial Intelligence Review
Case study: interactive visualization for internet security
Proceedings of the conference on Visualization '02
The Gaia Methodology for Agent-Oriented Analysis and Design
Autonomous Agents and Multi-Agent Systems
IEEE Transactions on Visualization and Computer Graphics
Design-to-Criteria Scheduling: Real-Time Agent Control
Revised Papers from the International Workshop on Infrastructure for Multi-Agent Systems: Infrastructure for Agents, Multi-Agent Systems, and Scalable Multi-Agent Systems
Modelling Agents in Hard Real-Time Environments
MAAMAW '99 Proceedings of the 9th European Workshop on Modelling Autonomous Agents in a Multi-Agent World: MultiAgent System Engineering
Towards a Distributed, Environment-Centered Agent Framework
ATAL '99 6th International Workshop on Intelligent Agents VI, Agent Theories, Architectures, and Languages (ATAL),
HAPTICS '02 Proceedings of the 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems
Towards a Real-Time Agent Architecture - A Whitepaper
WORDS '99 Proceedings of the Fifth International Workshop on Object-Oriented Real-Time Dependable Systems
A Real-Time Multi-Agent System Architecture for E-Commerce Applications
ISADS '01 Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems
Developing multiagent systems: The Gaia methodology
ACM Transactions on Software Engineering and Methodology (TOSEM)
Unsupervised learning techniques for an intrusion detection system
Proceedings of the 2004 ACM symposium on Applied computing
Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit
Data Mining and Knowledge Discovery
NVisionIP: netflow visualizations of system state for security situational awareness
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
SnortView: visualization system of snort logs
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Operational experiences with high-volume network intrusion detection
Proceedings of the 11th ACM conference on Computer and communications security
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
Intrusion detection using hierarchical neural networks
Pattern Recognition Letters
IDGraphs: Intrusion Detection and Analysis Using Histographs
VIZSEC '05 Proceedings of the IEEE Workshops on Visualization for Computer Security
Visualizing Cyber Attacks using IP Matrix
VIZSEC '05 Proceedings of the IEEE Workshops on Visualization for Computer Security
Exploring Three-dimensional Visualization for Intrusion Detection
VIZSEC '05 Proceedings of the IEEE Workshops on Visualization for Computer Security
IDS RainStorm: Visualizing IDS Alarms
VIZSEC '05 Proceedings of the IEEE Workshops on Visualization for Computer Security
A User-centered Look at Glyph-based Security Visualization
VIZSEC '05 Proceedings of the IEEE Workshops on Visualization for Computer Security
Preserving the Big Picture: Visual Network Traffic Analysis with TN
VIZSEC '05 Proceedings of the IEEE Workshops on Visualization for Computer Security
IDGraphs: Intrusion Detection and Analysis Using Stream Compositing
IEEE Computer Graphics and Applications
D-SCIDS: distributed soft computing intrusion detection system
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Hybrid multi-agent architecture as a real-time problem-solving model
Expert Systems with Applications: An International Journal
Developing real-time multi-agent systems
Integrated Computer-Aided Engineering
Visual Discovery in Computer Network Defense
IEEE Computer Graphics and Applications
A Projection Pursuit Algorithm for Exploratory Data Analysis
IEEE Transactions on Computers
IEEE Transactions on Visualization and Computer Graphics
Processing of massive audit data streams for real-time anomaly intrusion detection
Computer Communications
Intelligent Guidance and Suggestions Using Case-Based Planning
ICCBR '07 Proceedings of the 7th international conference on Case-Based Reasoning: Case-Based Reasoning Research and Development
Traffic Data Preparation for a Hybrid Network IDS
HAIS '08 Proceedings of the 3rd international workshop on Hybrid Artificial Intelligence Systems
Fast intrusion detection based on a non-negative matrix factorization model
Journal of Network and Computer Applications
A real-time intrusion detection algorithm for network security
WSEAS TRANSACTIONS on COMMUNICATIONS
Intrusion detection using fuzzy association rules
Applied Soft Computing
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System
Electronic Notes in Theoretical Computer Science (ENTCS)
Future Generation Computer Systems
Neural visualization of network traffic data for intrusion detection
Applied Soft Computing
A mobile agent approach to intrusion detection in network systems
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Interactive visualization for network and port scan detection
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
MOVICAB-IDS: visual analysis of network traffic data streams for intrusion detection
IDEAL'06 Proceedings of the 7th international conference on Intelligent Data Engineering and Automated Learning
Guardian: A prototype intelligent agent for intensive-care monitoring
Artificial Intelligence in Medicine
Curvilinear component analysis: a self-organizing neural network for nonlinear mapping of data sets
IEEE Transactions on Neural Networks
A comprehensive vulnerability based alert management approach for large networks
Future Generation Computer Systems
Deadline prediction scheduling based on benefits
Future Generation Computer Systems
Smart intelligent control of current source for high power LED diodes
Microelectronics Journal
Hi-index | 0.00 |
This study presents a novel Hybrid Intelligent Intrusion Detection System (IDS) known as RT-MOVICAB-IDS that incorporates temporal control. One of its main goals is to facilitate real-time Intrusion Detection, as accurate and swift responses are crucial in this field, especially if automatic abortion mechanisms are running. The formulation of this hybrid IDS combines Artificial Neural Networks (ANN) and Case-Based Reasoning (CBR) within a Multi-Agent System (MAS) to detect intrusions in dynamic computer networks. Temporal restrictions are imposed on this IDS, in order to perform real/execution time processing and assure system response predictability. Therefore, a dynamic real-time multi-agent architecture for IDS is proposed in this study, allowing the addition of predictable agents (both reactive and deliberative). In particular, two of the deliberative agents deployed in this system incorporate temporal-bounded CBR. This upgraded CBR is based on an anytime approximation, which allows the adaptation of this Artificial Intelligence paradigm to real-time requirements. Experimental results using real data sets are presented which validate the performance of this novel hybrid IDS.