Filters








9 Hits in 2.5 sec

CAMNEP: An intrusion detection system for highspeed networks

Martin REHAK, Michal PECHOUCEK, Karel BARTOS, Martin GRILL, Pavel CELEDA, Vojtech KRMICEK
2008 Progress in Informatics  
classified as malicious) which limits the effectiveness of current intrusion detection systems.  ...  They provide traffic statistics to the agent-based detection layer, where each agent uses a specific anomaly detection method to detect anomalies and describe the flows in its extended trust model.  ...  Acknowledgement This material is based upon work supported by the European Research Office of the US Army under Contract No. N62558-07-C-0001.  ... 
doi:10.2201/niipi.2008.5.7 fatcat:o36gvpctvzczvj4bg62qxq2wuu

Multi-Agent Heterogeneous Intrusion Detection System

Mikulás Pataky, Damas P. Gruska
2014 International Workshop on Concurrency, Specification and Programming  
Multi-agent heterogeneous intrusion detection system (M-AHIDS) is a prototype proposed to detect untrusted and unusual network behaviour.  ...  The system M-AHIDS is based on traffic statistics in sFlow format acquired by network device with sFlow agent and is able to perform a real-time surveillance of the 10 Gb networks.  ...  The aim of this paper is to propose a multi-agent system for network intrusion detection M-AHIDS.  ... 
dblp:conf/csp/PatakyG14 fatcat:4k2gn46lprberado5qbggoe2c4

Learning to Detect Network Intrusion from a Few Labeled Events and Background Traffic [chapter]

Gustav Šourek, Ondřej Kuželka, Filip Železný
2015 Lecture Notes in Computer Science  
Intrusion detection systems (IDS) analyse network traffic data with the goal to reveal malicious activities and incidents.  ...  Most of existing solutions thus, up to a certain level, rely on rules designed by network domain experts.  ...  Part of this work was done while the second author was with KU Leuven where he was supported by Jan Ramon's ERC Starting Grant 240186 "MiGraNT: Mining Graphs and Networks, a Theory-based approach".  ... 
doi:10.1007/978-3-319-20034-7_9 fatcat:fsrk6txjvbcqth5coquu57u6tq

Efficient Extraction of Network Event Types from NetFlows

Gustav Sourek, Filip Zelezny
2019 Security and Communication Networks  
The corresponding events are then extracted with a supreme recall as compared to a respective event extraction part of an in-production intrusion detection system Camnep.  ...  To perform sophisticated traffic analysis, such as intrusion detection, network monitoring tools firstly need to extract higher-level information from lower-level data by reconstructing events and activities  ...  The system for event extraction from NetFlows detailed in this paper is covered by US Patent US9374383B2 [32]  ... 
doi:10.1155/2019/8954914 fatcat:jbiaiby4qncjdlwadsreqyxajm

Analysing of M-AHIDS with Future States on DARPA and KDD99 Benchmarks

Mikulás Pataky, Damas P. Gruska
2016 International Workshop on Concurrency, Specification and Programming  
Second generation of Multi-agent heterogeneous intrusion detection system (M-AHIDS) is a prototype proposed to detect untrusted and unusual network behaviour.  ...  The M-AHIDS is based on online traffic statistics in sFlow format acquired by network device with the sFlow agent and is able to perform a real-time surveillance of the 10 Gb networks.  ...  The second, emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in the network traffic by trying to execute (portions of) the network packet payloads  ... 
dblp:conf/csp/PatakyG16 fatcat:lkbszdbtzvha7numyw4xm6r4qa

Towards a Multiagent-Based Distributed Intrusion Detection System Using Data Mining Approaches [chapter]

Imen Brahmi, Sadok Ben Yahia, Hamed Aouadi, Pascal Poncelet
2012 Lecture Notes in Computer Science  
The system that monitors the events occurring in a computer system or a network and analyzes the events for sign of intrusions is known as Intrusion Detection System (IDS).  ...  The proposed system relies on a set of intelligent agents that collect and analyze the network connections, and data mining techniques are shown to be useful to detect the intrusions.  ...  Thus, we introduce a new distributed IDS, called MAD-IDS (Multi-Agent using Data mining based Intrusion Detection System).  ... 
doi:10.1007/978-3-642-27609-5_12 fatcat:e7xjglvidbgwreikvuswcrkbyu

Network Anomaly Detection: Methods, Systems and Tools

Monowar H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita
2014 IEEE Communications Surveys and Tutorials  
We present attacks normally encountered by network intrusion detection systems.  ...  We categorize existing network anomaly detection methods and systems based on the underlying computational techniques used.  ...  For example, CAMNEP [182] is a fast prototype agent-based NIDS designed for high-speed networks.  ... 
doi:10.1109/surv.2013.052213.00046 fatcat:nevvj3lcovgllkbhrl5zasfu7m

Flow Based Security Awareness Framework for High-Speed Networks

Pavel Čeleda, Muni Cz, Martin Rehák, Vojtěch Krmíček, Karel Bartoš
unpublished
The intrusion detection message exchange format or plain text formated messages are used to describe an incident and provide human readable system output.  ...  Advanced agent-based trust modeling techniques estimate the trustfulness of observed flows.  ...  Presented flow based network intrusion detection system is able to identify significant malicious traffic events often hidden in a normal traffic overview.  ... 
fatcat:7rmszoxkkncu5nnbplgtiofkom

Field Programmable Gate Array Applications—A Scientometric Review

Juan Ruiz-Rosero, Gustavo Ramirez-Gonzalez, Rahul Khanna
2019 Computation  
These publications show the vast range of applications based on FPGAs, from the new mechanism that enables the magnetic suspension system for the kilogram redefinition, to the Mars rovers' navigation systems  ...  on chip or even artificial intelligence systems.  ...  CAMNEP: An intrusion detection system for high-speed networks. Prog. Inform. 2008, 65-74. [CrossRef] 405. Katz, J.; Lindell, Y.  ... 
doi:10.3390/computation7040063 fatcat:wxtatzsvvnfopghdfl25hcfc2a