A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Detecting Intrusions in Agent System by Means of Exception Handling
[chapter]
Lecture Notes in Computer Science
Securityrelated exceptions are identified and handled by a dedicated reflective layer of the protected agent, or delegated to specialized intrusion management agents in the system if the local reflective ...
We present a formal approach to conception of a dedicated security infrastructure based on the exception handling in the protected agents. ...
Martin Rehak would also like to acknowledge the support of the National Institute of Informatics in Tokyo during his inspiring visit. ...
doi:10.1007/978-3-540-74481-8_16
fatcat:aetkdddrovd2pauo2uf4am3sqe
HIDS and NIDS Hybrid Intrusion Detection System Model Design
2012
Advanced Engineering Forum
For the faults of HIDS or NIDS network intrusion detection system, Papers has designed a hybrid HIDS and NIDS intrusion detection system model, and the introduction of Agent systems, finally through analysis ...
the hybrid model of intrusion detection system, we can acquire its advantages. ...
In recent years, attacks have becomed more and more distributions and complicate and the intruder in the implementation of the time of the invasion is often accompanied by variety of means of the invasion ...
doi:10.4028/www.scientific.net/aef.6-7.991
fatcat:gk3w4egbbnbarfutfenwk5z4we
Can Multi-Agents Wake Us from IC Design Productivity Nightmare?
[chapter]
2007
Lecture Notes in Computer Science
Detecting Intrusions in Agent System by Means of Exception Handling
p. 161
Smart Caching Algorithm for Software Agents Based on Re-Execution Probability
p. 173
Planning and Scheduling
Metaheuristic ...
a Multi-Agent System
p. 127
Distributed Director Facilitator in a Multiagent Platform for Networked Embedded
Controllers
p. 137
Agent Methods for Network Intrusion Detection and Response
p. 149 ...
doi:10.1007/978-3-540-74481-8_2
fatcat:teicxmob2naw3isqb2yjlyqzgq
Towards a Cellular Automata Based Network Intrusion Detection System with Power Level Metric in Wireless Adhoc Networks (IDFADNWCA)
[article]
2014
arXiv
pre-print
The efficiency of an Intrusion detection system in the case of an adhoc network is not only determined by its dynamicity in monitoring but also in its flexibility in utilizing the available power in each ...
The detection of intrusions in the network is done with the help of Cellular Automata (CA). ...
The agent-based model proposed in [4] approaches the IDS problem with a technique that handles intrusions with an agent running on each system. ...
arXiv:1401.4012v1
fatcat:wjjcql4lgfgvviijs4sim5pium
Intrusion-detection model integrating anomaly with misuse for space information network
2016
Journal of Communications and Information Networks
Intrusion-detection model as an important part of a network security system becomes a hot issue in space network security. ...
We propose an intrusion-detection method that integrates anomaly with misuse, which supports automatic updates from a remote ground, and design a distributed intrusion-detection model of space information ...
Intrusion-detection agent The diagram of the functional component of an intrusion-detection agent is shown in Fig.1 . ...
doi:10.1007/bf03391573
fatcat:im4kp6batzaxpkxk5vtbouduru
Agent-Based Distributed Intrusion Alert System
[chapter]
2004
Lecture Notes in Computer Science
In this paper we propose an agent-based intrusion alert system that operates in a peer-to-peer environment. ...
Intrusion detection for computer systems is a key problem in today's Internet connected society. ...
Background
Intrusion Detection Systems The process of monitoring events occurring in a computer system or network and analyzing them for sign of intrusions is known as Intrusion Detection. ...
doi:10.1007/978-3-540-30536-1_28
fatcat:yjepmlq2krgyramtg4gppi7ndu
An Agent based Distributed Security System for Intrusion Detection in Computer Networks
2010
International Journal of Computer Applications
In this paper ecology of agents is being suggested that uses class hierarchy to define complex intrusions. ...
Intruders damage or steal valuable information by either bypassing security tools or penetrating through them, necessitating the need to detect such intrusion attempts especially in case of multi-event ...
In the recent years many intrusion detection systems making use of agents and mobile agents have been proposed. ...
doi:10.5120/1659-2234
fatcat:pcfu7lkskzet7mfugwwrabaeqq
A twofold self-healing approach for MANET survivability reinforcement
2017
International Journal of Intelligent Engineering Informatics
For that, even if the implications of intrusions could be minimized by the intrusion detection system MASID, still the need for the recovery of altered or deleted data is a vital step to ensure the correct ...
Distributed systems are by nature fault-prone systems. ...
It is based on the ability of the adopted intrusion detection system (MASID-R) to assess the damage caused by the detected intrusions. ...
doi:10.1504/ijiei.2017.10008800
fatcat:2qifnrxxcrc5rfj2ljpfyq7vbq
Automated discovery of concise predictive rules for intrusion detection
2002
Journal of Systems and Software
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. ...
An agent for the intrusion detection system, which uses a machine learning approach to automated discovery of concise rules from system call traces, is described. ...
Acknowledgements This work was supported by the Department of Defense. ...
doi:10.1016/s0164-1212(01)00088-7
fatcat:l6dzvgdzqvahrdlwatu2qmyvee
An Intrusion Detection and Response Cooperation Model Based on XML Message Exchange
2004
Pacific Asia Conference on Information Systems
In our model, cooperation agents correlate the detection results from the detection agents and cooperation agents of other domains to detect complex intrusions. ...
In a distributed intrusion detection system, multiple detection components are usually applied to monitor different hosts and network resources. ...
data by means of Generalized Intrusion Detection Object (GIDO) . ...
dblp:conf/pacis/DongXY04
fatcat:7hdvcuccmrgxdbzmur4gb4stda
Cooperative Trust Framework for Cloud Computing Based on Mobile Agents
2015
International Journal of Communication Networks and Information Security
To counter these kinds of attacks, a framework of cooperative Hybrid intrusion detection system (Hy-IDS) and Mobile Agents is proposed. This framework allows protection against the intrusion attacks. ...
Then, this framework unfolds in three phases: firstly, detection intrusion in a virtual environment using mobile agents for collected malicious data. ...
In this paper, we will deepen the development of our approach based in principle on the cooperation of the Hybrid Intrusion Detection System (Hy-IDS) and mobile agents. ...
dblp:journals/ijcnis/ToumiTMET15
fatcat:7tyyedjozvbdzgzsjwn5ojikz4
APHIDS++: Evolution of A Programmable Hybrid Intrusion Detection System
[chapter]
2005
Lecture Notes in Computer Science
The diversity of these manifold systems suggests the need for a unifying managerial system, such as APHIDS (A Programmable Hybrid Intrusion Detection System), a mobile agent based IDS, which can correlate ...
In this thesis we provide a description of improvements made to the initial APHIDS design, comprising the addition of an optional intelligent agent meant to improve the response of APHIDS in detecting ...
This research is supported in part by the Directorate of Telecom Engineering and Certification of the Department of Industry Canada. ...
doi:10.1007/11569510_3
fatcat:wabp3jgoerd6bbi3qiwz5pz4zi
D-SCIDS: Distributed soft computing intrusion detection system
2007
Journal of Network and Computer Applications
This paper evaluates three fuzzy rulebased classifiers to detect intrusions in a network. ...
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. ...
In Distributed Intrusion Detection System (DIDS) conventional intrusion detection system are embedded inside intelligent agents and are deployed over a large network. ...
doi:10.1016/j.jnca.2005.06.001
fatcat:iq6hrnsmh5dnlgymhn53oeqa74
Information visualization for an intrusion detection system
2005
Proceedings of the sixteenth ACM conference on Hypertext and hypermedia - HYPERTEXT '05
Most users of intrusion detection systems (IDS) do not monitor their system continuously and IDS have high false alarm rates. ...
Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. ...
CONCLUSION & FUTURE WORK Intrusion detection systems must handle masses of information (often in real-time) so as to report the abnormal use of networks and computer systems. ...
doi:10.1145/1083356.1083419
dblp:conf/ht/BlusteinFS05
fatcat:46fo2qrbkfhjdfzmhhfkywwoei
Design and implementation of Acceptance Monitor for building intrusion tolerant systems
2003
Software, Practice & Experience
The challenges here are how to take advantage of fault tolerant techniques in the intrusion tolerant system context and how to deal with possible unknown attacks and compromised components so as to continue ...
Intrusion detection research has so far concentrated on techniques that effectively identify the malicious behaviors. No assurance can be assumed once the system is compromised. ...
paradigms and by extending the techniques of intrusion detection to achieve error detection. ...
doi:10.1002/spe.554
fatcat:vix4tqyvlfdihccl5yrabqflna
« Previous
Showing results 1 — 15 out of 17,386 results