INTELLIGENT AGENTS FOR INTRUSION DETECTION IN DISTRIBUTED COMPUTER SYSTEMS

被引:0
|
作者
Walkowiak, Tomasz [1 ]
Parazel, Artur [1 ]
Mazurkiewicz, Jacek [1 ]
机构
[1] Wroclaw Univ Technol, Inst Comp Engn Control & Robot, PL-50372 Wroclaw, Poland
来源
MENDELL 2009 | 2009年
关键词
security; intrusion detection system; multi-agent technology;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a specification of the multi-agent system for intrusion detection supported by an intelligent evaluation. Groups of agents collectively monitor network traffic and local activity in order to identify information relevant to vicious events, that may be indicative of a intrusion attempt or system incidents. We also describe the implementation of the proposed architecture.
引用
收藏
页码:322 / 327
页数:6
相关论文
共 50 条
  • [31] DISTRIBUTED SYSTEMS, PARALLEL PROCESSING, AND THE INTELLIGENT COMPUTER
    HSU, DF
    [J]. THOUGHT-A REVIEW OF CULTURE AND IDEA, 1986, 61 (243): : 401 - 411
  • [32] DEVS simulation of distributed intrusion detection systems
    Cho, TH
    Kim, HJ
    [J]. SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2001, 18 (03): : 133 - 146
  • [33] DEVS simulation of distributed intrusion detection systems
    Cho, Tae Ho
    Kim, Hyung Jong
    [J]. Transactions of the Society for Computer Simulation, 2002, 18 (03): : 133 - 146
  • [34] Information sharing for distributed intrusion detection systems
    Peng, Tao
    Leckie, Christopher
    Ramamohanarao, Kotagiri
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 877 - 899
  • [35] Spam Intrusion Detection in Computer Networks Using Intelligent Techniques
    Ribeiro, Patricia Bellin
    da Silva, Luis Alexandre
    Pontara da Costa, Kelton Augusto
    [J]. PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 1357 - 1360
  • [37] GP ensemble for distributed intrusion detection systems
    Folino, G
    Pizzuti, C
    Spezzano, G
    [J]. PATTERN RECOGNITION AND DATA MINING, PT 1, PROCEEDINGS, 2005, 3686 : 54 - 62
  • [38] Testing and evaluating computer intrusion detection systems
    Durst, R
    Champion, T
    Witten, B
    Miller, E
    Spagnuolo, L
    [J]. COMMUNICATIONS OF THE ACM, 1999, 42 (07) : 53 - 61
  • [39] DIDMA: A distributed intrusion detection system using mobile agents
    Kannadiga, P
    Zulkernine, M
    [J]. SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERNG, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING AND FIRST AICS INTERNATIONAL WORKSHOP ON SELF-ASSEMBLING WIRELESS NETWORKS, PROCEEDINGS, 2005, : 238 - 245
  • [40] An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    Depren, O
    Topallar, M
    Anarim, E
    Ciliz, MK
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2005, 29 (04) : 713 - 722