-
2
-
-
0003200953
-
Artificial intelligence and intrusion detection: Current and future directions
-
Baltimore, MD
-
Frank, J.: Artificial Intelligence and Intrusion Detection: Current and Future Directions. In: 17th National Computer Security Conf., Baltimore, MD, Vol. 10 (1994)
-
(1994)
17th National Computer Security Conf.
, vol.10
-
-
Frank, J.1
-
3
-
-
0028430224
-
Network intrusion detection
-
Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network Intrusion Detection. IEEE Network 8(3), 26-41 (1994)
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
4
-
-
84886031178
-
-
Electronics and Surveillance Research Laboratory, Defence Science and Technology Organisation, Department of Defence, Australian Government
-
Engelhardt, D.: Directions for Intrusion Detection and Response: a Survey. Electronics and Surveillance Research Laboratory, Defence Science and Technology Organisation, Department of Defence, Australian Government (1997)
-
(1997)
Directions for Intrusion Detection and Response: A Survey
-
-
Engelhardt, D.1
-
6
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
Debar, H., Dacier, M., Wespi, A.: Towards a Taxonomy of Intrusion-Detection Systems. Computer Networks - the International Journal of Computer and Telecommunications Networking 31(8), 805-822 (1999)
-
(1999)
Computer Networks - The International Journal of Computer and Telecommunications Networking
, vol.31
, Issue.8
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
7
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Department of Computer Engineering
-
Axelsson, S.: Intrusion Detection Systems: A Survey and Taxonomy. Technical Report. Chalmers University of Technology. Department of Computer Engineering (2000)
-
(2000)
Technical Report. Chalmers University of Technology
-
-
Axelsson, S.1
-
8
-
-
0003914522
-
State of the practice of intrusion detection technologies
-
Carnegie Mellon University - Software Engineering Institute
-
Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., Stoner, E.: State of the Practice of Intrusion Detection Technologies. Technical Report CMU/SEI-99-TR-028. Carnegie Mellon University - Software Engineering Institute (2000)
-
(2000)
Technical Report CMU/SEI-99-TR-028
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
McHugh, J.4
Pickel, J.5
Stoner, E.6
-
10
-
-
0037105910
-
Intrusion detection techniques and approaches
-
Verwoerd, T., Hunt, R.: Intrusion Detection Techniques and Approaches. Computer Communications 25(15), 1356-1365 (2002)
-
(2002)
Computer Communications
, vol.25
, Issue.15
, pp. 1356-1365
-
-
Verwoerd, T.1
Hunt, R.2
-
12
-
-
4344659702
-
Anomaly detection methods in wired networks: A survey and taxonomy
-
Estevez-Tapiador, J.M., Garcia-Teodoro, P., Diaz-Verdejo, J.E.: Anomaly Detection Methods in Wired Networks: a Survey and Taxonomy. Computer Communications 27(16), 1569-1584 (2004)
-
(2004)
Computer Communications
, vol.27
, Issue.16
, pp. 1569-1584
-
-
Estevez-Tapiador, J.M.1
Garcia-Teodoro, P.2
Diaz-Verdejo, J.E.3
-
13
-
-
27844484884
-
Intrusion detection: A survey
-
Springer, US
-
Lazarevic, A., Kumar, V., Srivastava, J.: Intrusion Detection: a Survey. In: Managing Cyber Threats: Issues, Approaches, and Challenges 5. Massive Computing, pp. 19-78. Springer, US (2005)
-
(2005)
Managing Cyber Threats: Issues, Approaches, and Challenges 5. Massive Computing
, pp. 19-78
-
-
Lazarevic, A.1
Kumar, V.2
Srivastava, J.3
-
14
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
Patcha, A., Park, J.-M.: An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Computer Networks 51(12), 3448-3470 (2007)
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
15
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
García-Teodoro, P., Díaz-Verdejo, J., Maciá- Fernández, G., Vázquez, E.: Anomaly-based Network Intrusion Detection: Techniques, Systems and Challenges. Computers & Security 28(1-2), 18-28 (2009)
-
(2009)
Computers & Security
, vol.28
, Issue.1-2
, pp. 18-28
-
-
García-Teodoro, P.1
Díaz-Verdejo, J.2
Maciá- Fernández, G.3
Vázquez, E.4
-
17
-
-
84926306857
-
Is it an agent, or just a program? A taxonomy for autonomous agents
-
Jennings, N.R., Wooldridge, M.J., Müller, J.P. (eds.) LNCS Springer, Heidelberg
-
Franklin, S., Graesser, A.: Is It an Agent, or Just a Program? A Taxonomy for Autonomous Agents. In: Jennings, N.R., Wooldridge, M.J., Müller, J.P. (eds.) ECAI-WS 1996 and ATAL 1996. LNCS, Vol. 1193, pp. 21-35. Springer, Heidelberg (1997)
-
(1997)
ECAI-WS 1996 and ATAL 1996
, vol.1193
, pp. 21-35
-
-
Franklin, S.1
Graesser, A.2
-
21
-
-
0001417477
-
Negotiating task decomposition and allocation using partial global planning
-
Morgan Kaufmann Publishers Inc., San Francisco
-
Durfee, E.H., Lesser, V.R.: Negotiating Task Decomposition and Allocation Using Partial Global Planning. In: Distributed Artificial Intelligence, Vol. 2. Morgan Kaufmann Publishers Inc., San Francisco (1989)
-
(1989)
Distributed Artificial Intelligence
, vol.2
-
-
Durfee, E.H.1
Lesser, V.R.2
-
22
-
-
0032329151
-
A roadmap of agent research and development
-
Jennings, N.R., Sycara, K., Wooldridge, M.: A Roadmap of Agent Research and Development. Autonomous Agents and Multi-Agent Systems 1(1), 7-38 (1998)
-
(1998)
Autonomous Agents and Multi-Agent Systems
, vol.1
, Issue.1
, pp. 7-38
-
-
Jennings, N.R.1
Sycara, K.2
Wooldridge, M.3
-
24
-
-
85172423269
-
JAM: Java agents for meta-learning over distributed databases
-
Stolfo, S., Prodromidis, A.L., Tselepis, S., Lee, W., Fan, D.W., Chan, P.K.: JAM: Java Agents for Meta-Learning over Distributed Databases. In: Third International Conference on Knowledge Discovery and Data Mining, pp. 74-81 (1997)
-
(1997)
Third International Conference on Knowledge Discovery and Data Mining
, pp. 74-81
-
-
Stolfo, S.1
Prodromidis, A.L.2
Tselepis, S.3
Lee, W.4
Fan, D.W.5
Chan, P.K.6
-
27
-
-
33745590283
-
A multi-agent based system for intrusion detection
-
Hegazy, I.M., Al-Arif, T., Fayed, Z.T., Faheem, H.M.: A Multi-agent Based System for Intrusion Detection. IEEE Potentials 22(4), 28-31 (2003)
-
(2003)
IEEE Potentials
, vol.22
, Issue.4
, pp. 28-31
-
-
Hegazy, I.M.1
Al-Arif, T.2
Fayed, Z.T.3
Faheem, H.M.4
-
28
-
-
3042646967
-
Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning
-
Gorodetski, V., Kotenko, I., Karsaev, O.: Multi-Agent Technologies for Computer Network Security: Attack Simulation, Intrusion Detection and Intrusion Detection Learning. Computer Systems Science and Engineering 18(4), 191-200 (2003)
-
(2003)
Computer Systems Science and Engineering
, vol.18
, Issue.4
, pp. 191-200
-
-
Gorodetski, V.1
Kotenko, I.2
Karsaev, O.3
-
30
-
-
33646142046
-
Asynchronous alert correlation in multi-agent intrusion detection systems
-
Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.) LNCS Springer, Heidelberg
-
Gorodetsky, V., Karsaev, O., Samoilov, V., Ulanov, A.: Asynchronous alert correlation in multi-agent intrusion detection systems. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.) MMM-ACNS 2005. LNCS, Vol. 3685, pp. 366-379. Springer, Heidelberg (2005)
-
(2005)
MMM-ACNS 2005
, vol.3685
, pp. 366-379
-
-
Gorodetsky, V.1
Karsaev, O.2
Samoilov, V.3
Ulanov, A.4
-
31
-
-
24344493979
-
CIDS: An agent-based intrusion detection system
-
Dasgupta, D., Gonzalez, F., Yallapu, K., Gomez, J., Yarramsettii, R.: CIDS: An agent-based intrusion detection system. Computers & Security 24(5), 387-398 (2005)
-
(2005)
Computers & Security
, vol.24
, Issue.5
, pp. 387-398
-
-
Dasgupta, D.1
Gonzalez, F.2
Yallapu, K.3
Gomez, J.4
Yarramsettii, R.5
-
33
-
-
70350716910
-
The intrusion detection message exchange format (IDMEF)
-
Debar, H., Curry, D., Feinstein, B.: The Intrusion Detection Message Exchange Format (IDMEF). IETF RFC 4765 (2007)
-
(2007)
IETF RFC
, vol.4765
-
-
Debar, H.1
Curry, D.2
Feinstein, B.3
-
34
-
-
26844488270
-
PAID: A probabilistic agent-based intrusion detection system
-
Gowadia, V., Farkas, C., Valtorta, M.: PAID: A Probabilistic Agent-Based Intrusion Detection system. Computers & Security 24(7), 529-545 (2005)
-
(2005)
Computers & Security
, vol.24
, Issue.7
, pp. 529-545
-
-
Gowadia, V.1
Farkas, C.2
Valtorta, M.3
-
35
-
-
33847299487
-
Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction
-
Tsang, C.-H., Kwong, S.: Multi-agent Intrusion Detection System in Industrial Network using Ant Colony Clustering Approach and Unsupervised Feature Extraction. In: IEEE International Conference on Industrial Technology (ICIT 2005), pp. 51-56 (2005)
-
(2005)
IEEE International Conference on Industrial Technology (ICIT 2005)
, pp. 51-56
-
-
Tsang, C.-H.1
Kwong, S.2
-
36
-
-
34047255774
-
Hybrid multi-agent framework for detection of stealthy probes
-
Mukkamala, S., Sung, A.H., Abraham, A.: Hybrid Multi-agent Framework for Detection of Stealthy Probes. Applied Soft Computing 7(3), 631-641 (2007)
-
(2007)
Applied Soft Computing
, vol.7
, Issue.3
, pp. 631-641
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
-
37
-
-
78650135042
-
MOVIH-IDS: A mobile-visualization hybrid intrusion detection system
-
Herrero, Á., Corchado, E., Pellicer, M.A., Abraham, A.: MOVIH-IDS: A Mobile-Visualization Hybrid Intrusion Detection System. Neurocomputing 72(13-15), 2775-2784 (2009)
-
(2009)
Neurocomputing
, vol.72
, Issue.13-15
, pp. 2775-2784
-
-
Herrero, A.1
Corchado, E.2
Pellicer, M.A.3
Abraham, A.4
-
38
-
-
0344012555
-
Constructing deliberative agents with case-based reasoning technology
-
Corchado, J.M., Laza, R.: Constructing Deliberative Agents with Case-Based Reasoning Technology. International Journal of Intelligent Systems 18(12), 1227-1241 (2003)
-
(2003)
International Journal of Intelligent Systems
, vol.18
, Issue.12
, pp. 1227-1241
-
-
Corchado, J.M.1
Laza, R.2
-
40
-
-
0028401306
-
Case-based reasoning - Foundational issues, methodological variations, and system approaches
-
Aamodt, A., Plaza, E.: Case-Based Reasoning - Foundational Issues, Methodological Variations, and System Approaches. AI Communications 7(1), 39-59 (1994)
-
(1994)
AI Communications
, vol.7
, Issue.1
, pp. 39-59
-
-
Aamodt, A.1
Plaza, E.2
-
41
-
-
0011066222
-
-
US Department of Commerce, Technology Administration, National Institute of Standards and Technology
-
Jansen, W.A., Karygiannis, T., Marks, D.G.: Applying Mobile Agents to Intrusion Detection and Response. US Department of Commerce, Technology Administration, National Institute of Standards and Technology (1999)
-
(1999)
Applying Mobile Agents to Intrusion Detection and Response
-
-
Jansen, W.A.1
Karygiannis, T.2
Marks, D.G.3
-
42
-
-
79551666262
-
The implementation of IDA: An intrusion detection agent system
-
Asaka, M., Taguchi, A., Goto, S.: The Implementation of IDA: An Intrusion Detection Agent System. In: 11th Annual Computer Security Incident Handling Conference, Vol. 6 (1999)
-
(1999)
11th Annual Computer Security Incident Handling Conference
, vol.6
-
-
Asaka, M.1
Taguchi, A.2
Goto, S.3
-
44
-
-
0034301571
-
A denial-of-service resistant intrusion detection architecture
-
Mell, P., Marks, D., McLarnon, M.: A Denial-of-service Resistant Intrusion Detection Architecture. Computer Networks: The International Journal of Computer and Telecommunications Networking 34(4), 641-658 (2000)
-
(2000)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.34
, Issue.4
, pp. 641-658
-
-
Mell, P.1
Marks, D.2
McLarnon, M.3
-
45
-
-
33646520166
-
SPARTA: A mobile agent based instrusion detection system
-
IFIP Conference Proceedings Kluwer, Dordrecht
-
Krügel, C., Toth, T., Kirda, E.: SPARTA: a Mobile Agent Based Instrusion Detection System. In: IFIP TC11 WG11.4 First Annual Working Conference on Network Security: Advances in Network and Distributed Systems Security. IFIP Conference Proceedings, Vol. 206, pp. 187-200. Kluwer, Dordrecht (2001)
-
(2001)
IFIP TC11 WG11.4 First Annual Working Conference on Network Security: Advances in Network and Distributed Systems Security
, vol.206
, pp. 187-200
-
-
Krügel, C.1
Toth, T.2
Kirda, E.3
-
47
-
-
0037083574
-
Automated discovery of concise predictive rules for intrusion detection
-
Helmer, G., Wong, J.S.K., Honavar, V.G., Miller, L.: Automated Discovery of Concise Predictive Rules for Intrusion Detection. Journal of Systems and Software 60(3), 165-175 (2002)
-
(2002)
Journal of Systems and Software
, vol.60
, Issue.3
, pp. 165-175
-
-
Helmer, G.1
Wong, J.S.K.2
Honavar, V.G.3
Miller, L.4
-
48
-
-
0038729639
-
Lightweight agents for intrusion detection
-
Helmer, G., Wong, J.S.K., Honavar, V., Miller, L., Wang, Y.: Lightweight Agents for Intrusion Detection. Journal of Systems and Software 67(2), 109-122 (2003)
-
(2003)
Journal of Systems and Software
, vol.67
, Issue.2
, pp. 109-122
-
-
Helmer, G.1
Wong, J.S.K.2
Honavar, V.3
Miller, L.4
Wang, Y.5
-
49
-
-
10444274050
-
MA-IDS architecture for distributed intrusion detection using mobile agents
-
Li, C., Song, Q., Zhang, C.: MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agents. In: 2nd International Conference on Information Technology for Application (ICITA 2004), pp. 451-455 (2004)
-
(2004)
2nd International Conference on Information Technology for Application (ICITA 2004)
, pp. 451-455
-
-
Li, C.1
Song, Q.2
Zhang, C.3
-
50
-
-
3543079858
-
Optimizing the scalability of network intrusion detection systems using mobile agents
-
Marks, D.G., Mell, P., Stinson, M.: Optimizing the Scalability of Network Intrusion Detection Systems Using Mobile Agents. Journal of Network and Systems Management 12(1), 95-110 (2004)
-
(2004)
Journal of Network and Systems Management
, vol.12
, Issue.1
, pp. 95-110
-
-
Marks, D.G.1
Mell, P.2
Stinson, M.3
-
51
-
-
35048820538
-
APHIDS: A mobile agent-based programmable hybrid intrusion detection system
-
Karmouch, A., Korba, L., Madeira, E.R.M. (eds.) LNCS Springer, Heidelberg
-
Deeter, K., Singh, K., Wilson, S., Filipozzi, L., Vuong, S.T.: APHIDS: A mobile agent-based programmable hybrid intrusion detection system. In: Karmouch, A., Korba, L., Madeira, E.R.M. (eds.) MATA 2004. LNCS, Vol. 3284, pp. 244-253. Springer, Heidelberg (2004)
-
(2004)
MATA 2004
, vol.3284
, pp. 244-253
-
-
Deeter, K.1
Singh, K.2
Wilson, S.3
Filipozzi, L.4
Vuong, S.T.5
-
52
-
-
33646535645
-
APHIDS++: Evolution of A programmable hybrid intrusion detection system
-
Magedanz, T., Karmouch, A., Pierre, S., Venieris, I.S. (eds.) LNCS Springer, Heidelberg
-
Alam, M.S., Gupta, A., Wires, J., Vuong, S.T.: APHIDS++: Evolution of A programmable hybrid intrusion detection system. In: Magedanz, T., Karmouch, A., Pierre, S., Venieris, I.S. (eds.) MATA 2005. LNCS, Vol. 3744, pp. 22-31. Springer, Heidelberg (2005)
-
(2005)
MATA 2005
, vol.3744
, pp. 22-31
-
-
Alam, M.S.1
Gupta, A.2
Wires, J.3
Vuong, S.T.4
-
53
-
-
33745317862
-
A mobile agent approach to intrusion detection in network systems
-
Khosla, R., Howlett, R.J., Jain, L.C. (eds.) LNCS (LNAI) Springer, Heidelberg
-
Kolaczek, G., Pieczynska-Kuchtiak, A., Juszczyszyn, K., Grzech, A., Katarzyniak, R.P., Nguyen, N.T.: A mobile agent approach to intrusion detection in network systems. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), Vol. 3682, pp. 514-519. Springer, Heidelberg (2005)
-
(2005)
KES 2005
, vol.3682
, pp. 514-519
-
-
Kolaczek, G.1
Pieczynska-Kuchtiak, A.2
Juszczyszyn, K.3
Grzech, A.4
Katarzyniak, R.P.5
Nguyen, N.T.6
-
55
-
-
79551657945
-
IDSUDA: An intrusion detection system using distributed agents
-
Alim, A.S.A., Ismail, A.S., Ahmed, S.H.: IDSUDA: An Intrusion Detection System Using Distributed Agents. Journal of Computer Networks and Internet Research 5(1), 1-11 (2005)
-
(2005)
Journal of Computer Networks and Internet Research
, vol.5
, Issue.1
, pp. 1-11
-
-
Alim, A.S.A.1
Ismail, A.S.2
Ahmed, S.H.3
-
56
-
-
33745660126
-
Mobile agents for network intrusion resistance
-
Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) LNCS Springer, Heidelberg
-
Wang, H.Q., Wang, Z.Q., Zhao, Q., Wang, G.F., Zheng, R.J., Liu, D.X.: Mobile agents for network intrusion resistance. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, Vol. 3842, pp. 965-970. Springer, Heidelberg (2006)
-
(2006)
APWeb Workshops 2006
, vol.3842
, pp. 965-970
-
-
Wang, H.Q.1
Wang, Z.Q.2
Zhao, Q.3
Wang, G.F.4
Zheng, R.J.5
Liu, D.X.6
|