IEEE Transactions on Software Engineering - Special issue on computer security and privacy
The nature of statistical learning theory
The nature of statistical learning theory
Secure computing: threats and safeguards
Secure computing: threats and safeguards
Communications of the ACM
NetSTAT: a network-based intrusion detection system
Journal of Computer Security
Intrusion detection using autonomous agents
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
Intrusion detection inter-component adaptive negotiation
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
Implementation of an Intrusion Detection System Based on Mobile Agents
PDSE '00 Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems
Distributed audit trail analysis
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
NSTAT: A Model-based Real-time Network Intrusion Detection System
NSTAT: A Model-based Real-time Network Intrusion Detection System
Lightweight agents for intrusion detection
Journal of Systems and Software
Adaptive Neuro-Fuzzy Intrusion Detection Systems
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Intrusion detection using an ensemble of intelligent paradigms
Journal of Network and Computer Applications - Special issue on computational intelligence on the internet
Learning trees and rules with set-valued features
AAAI'96 Proceedings of the thirteenth national conference on Artificial intelligence - Volume 1
SCIDS: a soft computing intrusion detection system
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
Design and implementation of a decentralized prototype system for detecting distributed attacks
Computer Communications
Cooperating security managers: a peer-based intrusion detection system
IEEE Network: The Magazine of Global Internetworking
Conceptual design of remote monitoring and fault diagnosis systems
Information Systems
A fuzzy-genetic approach to network intrusion detection
Proceedings of the 10th annual conference companion on Genetic and evolutionary computation
On Some Method for Intrusion Detection Used by the Multi-agent Monitoring System
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part III
Classification Agent-Based Techniques for Detecting Intrusions in Databases
HAIS '08 Proceedings of the 3rd international workshop on Hybrid Artificial Intelligence Systems
Towards open decision support systems based on semantic focused crawling
Expert Systems with Applications: An International Journal
Nature Inspired Online Real Risk Assessment Models for Security Systems
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Modelling intrusion detection as an allocation problem
Pattern Recognition Letters
A Solution CBR Agent-Based to Classify SOAP Message within SOA Environments
HAIS '09 Proceedings of the 4th International Conference on Hybrid Artificial Intelligence Systems
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Cooperation modeling for intrusion detection system based on multi-SoftMan
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Collaborative architecture for distributed intrusion detection system
CISDA'09 Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications
Distributed architecture for intrusion detection system based on multi-softman
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Review: Development of soft computing and applications in agricultural and biological engineering
Computers and Electronics in Agriculture
CollSec'10 Proceedings of the 2010 international conference on Collaborative methods for security and privacy
Neural visualization of network traffic data for intrusion detection
Applied Soft Computing
KES-AMSTA'11 Proceedings of the 5th KES international conference on Agent and multi-agent systems: technologies and applications
Learning from others: Exchange of classification rules in intelligent distributed systems
Artificial Intelligence
RT-MOVICAB-IDS: Addressing real-time intrusion detection
Future Generation Computer Systems
Minimal complexity attack classification intrusion detection system
Applied Soft Computing
Engineering Applications of Artificial Intelligence
Hi-index | 0.00 |
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. A Distributed IDS (DIDS) consists of several IDS over a large network (s), all of which communicate with each other, or with a central server that facilitates advanced network monitoring. In a distributed environment, DIDS are implemented using co-operative intelligent agents distributed across the network(s). This paper evaluates three fuzzy rule-based classifiers to detect intrusions in a network. Results are then compared with other machine learning techniques like decision trees, support vector machines and linear genetic programming. Further, we modeled Distributed Soft Computing-based IDS (D-SCIDS) as a combination of different classifiers to model lightweight and more accurate (heavy weight) IDS. Empirical results clearly show that soft computing approach could play a major role for intrusion detection.