A cop on the beat: collecting and appraising intrusion evidence
Communications of the ACM
Testing and evaluating computer intrusion detection systems
Communications of the ACM
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Key management for long-lived sensor networks in hostile environments
Computer Communications
A smart IDS and response system for the internet malicious worm
International Journal of Wireless and Mobile Computing
Building an inter-IDS central analysis platform in the network center of China's central bank
CTS'05 Proceedings of the 2005 international conference on Collaborative technologies and systems
Hi-index | 0.00 |
Intrusion detection research has been conducted for nearly 20 years but still remains in its infancy. The existing intrusion detection system architectures have a number of problems that limit their configurability, scalability, and efficiency. This paper first discusses the threats to networked computer systems, and introduces the intrusion detection mechanisms and agenttechnologies. On the basis of the above discussion, a multi-agent based intrusion detection architecture for LAN is proposed. This architecture can be easily extended and maintained, supporting distributed and intelligent intrusion detection. In addition, it can enhance the wholesystem's detection efficiency greatly.