IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Classification and detection of computer intrusions
Classification and detection of computer intrusions
Communications of the ACM
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Active security management based on secure zone cooperation
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
Intrusion detection using an ensemble of intelligent paradigms
Journal of Network and Computer Applications - Special issue on computational intelligence on the internet
D-SCIDS: distributed soft computing intrusion detection system
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Intrusion detection using a fuzzy genetics-based learning algorithm
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Design and implementation of a misused intrusion detection system using autonomous and mobile agents
EATIS '07 Proceedings of the 2007 Euro American conference on Telematics and information systems
International Journal of Information and Computer Security
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 02
Using Artificial Intelligence for Intrusion Detection
Proceedings of the 2007 conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies
TRINETR: An architecture for collaborative intrusion detection and knowledge-based alert evaluation
Advanced Engineering Informatics
Design of secure monitor in the secure zone cooperation
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Cost-effective IDS operating scheme in MANETs
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A Snort-based agent for a JADE multi-agent intrusion detection system
International Journal of Intelligent Information and Database Systems
Effective multimodel anomaly detection using cooperative negotiation
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Real-time risk assessment with network sensors and intrusion detection systems
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
An intelligent agent-based framework for collaborative information security
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
A mobile agent-based p2p autonomous security hole discovery system
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
APA: an interior-oriented intrusion detection system based on multi-agents
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Research in intrusion detection system based on mobile agent
ICICA'11 Proceedings of the Second international conference on Information Computing and Applications
Lightweight energy consumption based intrusion detection system for wireless sensor networks
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Hi-index | 0.00 |
We have designed and implemented an intrusion detection system (IDS) prototype based on mobile agents. Our agents travel between monitored systems in a network of distributed systems, obtain information from data cleaning agents, classify and correlate information, and report the information to a user interface and database via mediators.Agent systems with lightweight agent support allow runtime addition of new capabilities to agents. We describe the design of our Multi-agent IDS and show how lightweight agent capabilities allowed us to add communication and collaboration capabilities to the mobile agents in our IDS.