Intelligent feature selection and classification techniques for intrusion detection in networks: a survey
Rapid growth in the Internet usage and diverse military applications have led researchers to
think of intelligent systems that can assist the users and applications in getting the services …
think of intelligent systems that can assist the users and applications in getting the services …
[PDF][PDF] A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems.
SA Onashoga, AD Akinde, AS Sodiya - Issues in Informing Science & …, 2009 - tex-host.ru
Abstract Intrusion Detection Systems (IDS) is defined as a component that analyses system
and user operations in computer and network systems in search of activities considered …
and user operations in computer and network systems in search of activities considered …
Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems
G Helmer, J Wong, M Slagell… - … of Information and …, 2007 - inderscienceonline.com
The integration of Software Fault Tree (SFT), which describes intrusions and Coloured Petri
Nets (CPNs) that specifies design, is examined for an Intrusion Detection System (IDS). The …
Nets (CPNs) that specifies design, is examined for an Intrusion Detection System (IDS). The …
[PDF][PDF] Fuzzy automaton as a detection mechanism for the multi-step attack
The integration of a fuzzy system and automaton theory can form the concept of fuzzy
automaton. This integration allows a discretely defined state-machine to act on continuous …
automaton. This integration allows a discretely defined state-machine to act on continuous …
[PDF][PDF] A survey on intrusion detection system: State of the art review
J Amudhavel, V Brindha… - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
Abstract Background/Objectives: To analyze and monitoring the activity of nodes using an
IDS Intrusion Detection System which provide security to the system. Findings: In this …
IDS Intrusion Detection System which provide security to the system. Findings: In this …
[PDF][PDF] An Ontology based Agent Generation for Information Retrieval on Cloud Environment.
Retrieving information or discovering knowledge from a well organized data center in
general is requested to be familiar with its schema, structure, and architecture, which against …
general is requested to be familiar with its schema, structure, and architecture, which against …
Autonomous decision on intrusion detection with trained BDI agents
In the context of computer security, the first step to respond to an intrusive incident is the
detection of such activity in the monitored system. In recent years, research in intrusion …
detection of such activity in the monitored system. In recent years, research in intrusion …
Promoting the development of secure mobile agent applications
In this paper, we present a software architecture and a development environment for the
implementation of applications based on secure mobile agents. Recent breakthroughs in …
implementation of applications based on secure mobile agents. Recent breakthroughs in …
Multi-agent distributed intrusion detection system model based on BP neural network
H Chen-jun, Z Wei-ming - International Journal of Security and Its …, 2014 - earticle.net
On the basis of analyzing the existing intrusion detection system (IDS) based on agent, this
paper proposed a multi-agent distributed IDS (DIDS) model based on BP neural network …
paper proposed a multi-agent distributed IDS (DIDS) model based on BP neural network …
Intrusion detection system for signal based SIP attacks through timed HCPN
Y Ding, G Su - … on Availability, Reliability and Security (ARES' …, 2007 - ieeexplore.ieee.org
As session initiation protocol is becoming widely used for the current IP telephony services
due to its simplicity and powerful functions, vulnerabilities it exposes make it susceptible to …
due to its simplicity and powerful functions, vulnerabilities it exposes make it susceptible to …