Filters








17,386 Hits in 8.5 sec

Detecting Intrusions in Agent System by Means of Exception Handling [chapter]

Eric Platon, Martin Rehák, Nicolas Sabouret, Michal Pěchouček, Shinichi Honiden
Lecture Notes in Computer Science  
Securityrelated exceptions are identified and handled by a dedicated reflective layer of the protected agent, or delegated to specialized intrusion management agents in the system if the local reflective  ...  We present a formal approach to conception of a dedicated security infrastructure based on the exception handling in the protected agents.  ...  Martin Rehak would also like to acknowledge the support of the National Institute of Informatics in Tokyo during his inspiring visit.  ... 
doi:10.1007/978-3-540-74481-8_16 fatcat:aetkdddrovd2pauo2uf4am3sqe

HIDS and NIDS Hybrid Intrusion Detection System Model Design

Zhen Qi Wang, Dan Kai Zhang
2012 Advanced Engineering Forum  
For the faults of HIDS or NIDS network intrusion detection system, Papers has designed a hybrid HIDS and NIDS intrusion detection system model, and the introduction of Agent systems, finally through analysis  ...  the hybrid model of intrusion detection system, we can acquire its advantages.  ...  In recent years, attacks have becomed more and more distributions and complicate and the intruder in the implementation of the time of the invasion is often accompanied by variety of means of the invasion  ... 
doi:10.4028/www.scientific.net/aef.6-7.991 fatcat:gk3w4egbbnbarfutfenwk5z4we

Can Multi-Agents Wake Us from IC Design Productivity Nightmare? [chapter]

Peter van Staa, Christian Sebeke
2007 Lecture Notes in Computer Science  
Detecting Intrusions in Agent System by Means of Exception Handling p. 161 Smart Caching Algorithm for Software Agents Based on Re-Execution Probability p. 173 Planning and Scheduling Metaheuristic  ...  a Multi-Agent System p. 127 Distributed Director Facilitator in a Multiagent Platform for Networked Embedded Controllers p. 137 Agent Methods for Network Intrusion Detection and Response p. 149  ... 
doi:10.1007/978-3-540-74481-8_2 fatcat:teicxmob2naw3isqb2yjlyqzgq

Towards a Cellular Automata Based Network Intrusion Detection System with Power Level Metric in Wireless Adhoc Networks (IDFADNWCA) [article]

Pokkuluri Kiran Sree, Inampudi Ramesh Babu
2014 arXiv   pre-print
The efficiency of an Intrusion detection system in the case of an adhoc network is not only determined by its dynamicity in monitoring but also in its flexibility in utilizing the available power in each  ...  The detection of intrusions in the network is done with the help of Cellular Automata (CA).  ...  The agent-based model proposed in [4] approaches the IDS problem with a technique that handles intrusions with an agent running on each system.  ... 
arXiv:1401.4012v1 fatcat:wjjcql4lgfgvviijs4sim5pium

Intrusion-detection model integrating anomaly with misuse for space information network

Chundong She, Yaqi Ma, Luting Jia, Ligang Fei, Baohua Kou
2016 Journal of Communications and Information Networks  
Intrusion-detection model as an important part of a network security system becomes a hot issue in space network security.  ...  We propose an intrusion-detection method that integrates anomaly with misuse, which supports automatic updates from a remote ground, and design a distributed intrusion-detection model of space information  ...  Intrusion-detection agent The diagram of the functional component of an intrusion-detection agent is shown in Fig.1 .  ... 
doi:10.1007/bf03391573 fatcat:im4kp6batzaxpkxk5vtbouduru

Agent-Based Distributed Intrusion Alert System [chapter]

Arjita Ghosh, Sandip Sen
2004 Lecture Notes in Computer Science  
In this paper we propose an agent-based intrusion alert system that operates in a peer-to-peer environment.  ...  Intrusion detection for computer systems is a key problem in today's Internet connected society.  ...  Background Intrusion Detection Systems The process of monitoring events occurring in a computer system or network and analyzing them for sign of intrusions is known as Intrusion Detection.  ... 
doi:10.1007/978-3-540-30536-1_28 fatcat:yjepmlq2krgyramtg4gppi7ndu

An Agent based Distributed Security System for Intrusion Detection in Computer Networks

Arun Saxena, A.K. Sharma
2010 International Journal of Computer Applications  
In this paper ecology of agents is being suggested that uses class hierarchy to define complex intrusions.  ...  Intruders damage or steal valuable information by either bypassing security tools or penetrating through them, necessitating the need to detect such intrusion attempts especially in case of multi-event  ...  In the recent years many intrusion detection systems making use of agents and mobile agents have been proposed.  ... 
doi:10.5120/1659-2234 fatcat:pcfu7lkskzet7mfugwwrabaeqq

A twofold self-healing approach for MANET survivability reinforcement

Damien Magoni, Leila Mechtri, Salim Ghanemi, Fatiha Djemili Tolba
2017 International Journal of Intelligent Engineering Informatics  
For that, even if the implications of intrusions could be minimized by the intrusion detection system MASID, still the need for the recovery of altered or deleted data is a vital step to ensure the correct  ...  Distributed systems are by nature fault-prone systems.  ...  It is based on the ability of the adopted intrusion detection system (MASID-R) to assess the damage caused by the detected intrusions.  ... 
doi:10.1504/ijiei.2017.10008800 fatcat:2qifnrxxcrc5rfj2ljpfyq7vbq

Automated discovery of concise predictive rules for intrusion detection

Guy Helmer, Johnny S.K. Wong, Vasant Honavar, Les Miller
2002 Journal of Systems and Software  
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection.  ...  An agent for the intrusion detection system, which uses a machine learning approach to automated discovery of concise rules from system call traces, is described.  ...  Acknowledgements This work was supported by the Department of Defense.  ... 
doi:10.1016/s0164-1212(01)00088-7 fatcat:l6dzvgdzqvahrdlwatu2qmyvee

An Intrusion Detection and Response Cooperation Model Based on XML Message Exchange

Xiaomei Dong, Guang Xiang, Ge Yu
2004 Pacific Asia Conference on Information Systems  
In our model, cooperation agents correlate the detection results from the detection agents and cooperation agents of other domains to detect complex intrusions.  ...  In a distributed intrusion detection system, multiple detection components are usually applied to monitor different hosts and network resources.  ...  data by means of Generalized Intrusion Detection Object (GIDO) .  ... 
dblp:conf/pacis/DongXY04 fatcat:7hdvcuccmrgxdbzmur4gb4stda

Cooperative Trust Framework for Cloud Computing Based on Mobile Agents

Hicham Toumi, Amal Talea, Bouchra Marzak, Ahmed Eddaoui, Mohamed Talea
2015 International Journal of Communication Networks and Information Security  
To counter these kinds of attacks, a framework of cooperative Hybrid intrusion detection system (Hy-IDS) and Mobile Agents is proposed. This framework allows protection against the intrusion attacks.  ...  Then, this framework unfolds in three phases: firstly, detection intrusion in a virtual environment using mobile agents for collected malicious data.  ...  In this paper, we will deepen the development of our approach based in principle on the cooperation of the Hybrid Intrusion Detection System (Hy-IDS) and mobile agents.  ... 
dblp:journals/ijcnis/ToumiTMET15 fatcat:7tyyedjozvbdzgzsjwn5ojikz4

APHIDS++: Evolution of A Programmable Hybrid Intrusion Detection System [chapter]

Mohammed S. Alam, Abhishek Gupta, Jake Wires, Son Vuong
2005 Lecture Notes in Computer Science  
The diversity of these manifold systems suggests the need for a unifying managerial system, such as APHIDS (A Programmable Hybrid Intrusion Detection System), a mobile agent based IDS, which can correlate  ...  In this thesis we provide a description of improvements made to the initial APHIDS design, comprising the addition of an optional intelligent agent meant to improve the response of APHIDS in detecting  ...  This research is supported in part by the Directorate of Telecom Engineering and Certification of the Department of Industry Canada.  ... 
doi:10.1007/11569510_3 fatcat:wabp3jgoerd6bbi3qiwz5pz4zi

D-SCIDS: Distributed soft computing intrusion detection system

Ajith Abraham, Ravi Jain, Johnson Thomas, Sang Yong Han
2007 Journal of Network and Computer Applications  
This paper evaluates three fuzzy rulebased classifiers to detect intrusions in a network.  ...  An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused.  ...  In Distributed Intrusion Detection System (DIDS) conventional intrusion detection system are embedded inside intelligent agents and are deployed over a large network.  ... 
doi:10.1016/j.jnca.2005.06.001 fatcat:iq6hrnsmh5dnlgymhn53oeqa74

Information visualization for an intrusion detection system

James Blustein, Ching-Lung Fu, Daniel L. Silver
2005 Proceedings of the sixteenth ACM conference on Hypertext and hypermedia - HYPERTEXT '05  
Most users of intrusion detection systems (IDS) do not monitor their system continuously and IDS have high false alarm rates.  ...  Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly.  ...  CONCLUSION & FUTURE WORK Intrusion detection systems must handle masses of information (often in real-time) so as to report the abnormal use of networks and computer systems.  ... 
doi:10.1145/1083356.1083419 dblp:conf/ht/BlusteinFS05 fatcat:46fo2qrbkfhjdfzmhhfkywwoei

Design and implementation of Acceptance Monitor for building intrusion tolerant systems

Rong Wang, Feiyi Wang, Gregory T. Byrd
2003 Software, Practice & Experience  
The challenges here are how to take advantage of fault tolerant techniques in the intrusion tolerant system context and how to deal with possible unknown attacks and compromised components so as to continue  ...  Intrusion detection research has so far concentrated on techniques that effectively identify the malicious behaviors. No assurance can be assumed once the system is compromised.  ...  paradigms and by extending the techniques of intrusion detection to achieve error detection.  ... 
doi:10.1002/spe.554 fatcat:vix4tqyvlfdihccl5yrabqflna
« Previous Showing results 1 — 15 out of 17,386 results