메뉴 건너뛰기




Volumn 63 AISC, Issue , 2009, Pages 143-154

Multiagent systems for network intrusion detection: A review

Author keywords

Computer network security; Distributed artificial intelligence; Intrusion detection; Multiagent systems

Indexed keywords

ARCHITECTURAL POINTS; DISTRIBUTED ARTIFICIAL INTELLIGENCE; INTRUSION DETECTION SYSTEMS; MODERN INFRASTRUCTURE; NETWORK INTRUSION DETECTION; NETWORK POLICY; SECURITY SOLUTIONS; STATE OF THE ART;

EID: 77954528035     PISSN: 18675662     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-04091-7_18     Document Type: Conference Paper
Times cited : (17)

References (56)
  • 2
    • 0003200953 scopus 로고
    • Artificial intelligence and intrusion detection: Current and future directions
    • Baltimore, MD
    • Frank, J.: Artificial Intelligence and Intrusion Detection: Current and Future Directions. In: 17th National Computer Security Conf., Baltimore, MD, Vol. 10 (1994)
    • (1994) 17th National Computer Security Conf. , vol.10
    • Frank, J.1
  • 4
    • 84886031178 scopus 로고    scopus 로고
    • Electronics and Surveillance Research Laboratory, Defence Science and Technology Organisation, Department of Defence, Australian Government
    • Engelhardt, D.: Directions for Intrusion Detection and Response: a Survey. Electronics and Surveillance Research Laboratory, Defence Science and Technology Organisation, Department of Defence, Australian Government (1997)
    • (1997) Directions for Intrusion Detection and Response: A Survey
    • Engelhardt, D.1
  • 7
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy
    • Department of Computer Engineering
    • Axelsson, S.: Intrusion Detection Systems: A Survey and Taxonomy. Technical Report. Chalmers University of Technology. Department of Computer Engineering (2000)
    • (2000) Technical Report. Chalmers University of Technology
    • Axelsson, S.1
  • 10
    • 0037105910 scopus 로고    scopus 로고
    • Intrusion detection techniques and approaches
    • Verwoerd, T., Hunt, R.: Intrusion Detection Techniques and Approaches. Computer Communications 25(15), 1356-1365 (2002)
    • (2002) Computer Communications , vol.25 , Issue.15 , pp. 1356-1365
    • Verwoerd, T.1    Hunt, R.2
  • 14
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • Patcha, A., Park, J.-M.: An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Computer Networks 51(12), 3448-3470 (2007)
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 16
  • 17
    • 84926306857 scopus 로고    scopus 로고
    • Is it an agent, or just a program? A taxonomy for autonomous agents
    • Jennings, N.R., Wooldridge, M.J., Müller, J.P. (eds.) LNCS Springer, Heidelberg
    • Franklin, S., Graesser, A.: Is It an Agent, or Just a Program? A Taxonomy for Autonomous Agents. In: Jennings, N.R., Wooldridge, M.J., Müller, J.P. (eds.) ECAI-WS 1996 and ATAL 1996. LNCS, Vol. 1193, pp. 21-35. Springer, Heidelberg (1997)
    • (1997) ECAI-WS 1996 and ATAL 1996 , vol.1193 , pp. 21-35
    • Franklin, S.1    Graesser, A.2
  • 21
    • 0001417477 scopus 로고
    • Negotiating task decomposition and allocation using partial global planning
    • Morgan Kaufmann Publishers Inc., San Francisco
    • Durfee, E.H., Lesser, V.R.: Negotiating Task Decomposition and Allocation Using Partial Global Planning. In: Distributed Artificial Intelligence, Vol. 2. Morgan Kaufmann Publishers Inc., San Francisco (1989)
    • (1989) Distributed Artificial Intelligence , vol.2
    • Durfee, E.H.1    Lesser, V.R.2
  • 27
    • 33745590283 scopus 로고    scopus 로고
    • A multi-agent based system for intrusion detection
    • Hegazy, I.M., Al-Arif, T., Fayed, Z.T., Faheem, H.M.: A Multi-agent Based System for Intrusion Detection. IEEE Potentials 22(4), 28-31 (2003)
    • (2003) IEEE Potentials , vol.22 , Issue.4 , pp. 28-31
    • Hegazy, I.M.1    Al-Arif, T.2    Fayed, Z.T.3    Faheem, H.M.4
  • 28
    • 3042646967 scopus 로고    scopus 로고
    • Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning
    • Gorodetski, V., Kotenko, I., Karsaev, O.: Multi-Agent Technologies for Computer Network Security: Attack Simulation, Intrusion Detection and Intrusion Detection Learning. Computer Systems Science and Engineering 18(4), 191-200 (2003)
    • (2003) Computer Systems Science and Engineering , vol.18 , Issue.4 , pp. 191-200
    • Gorodetski, V.1    Kotenko, I.2    Karsaev, O.3
  • 30
    • 33646142046 scopus 로고    scopus 로고
    • Asynchronous alert correlation in multi-agent intrusion detection systems
    • Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.) LNCS Springer, Heidelberg
    • Gorodetsky, V., Karsaev, O., Samoilov, V., Ulanov, A.: Asynchronous alert correlation in multi-agent intrusion detection systems. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.) MMM-ACNS 2005. LNCS, Vol. 3685, pp. 366-379. Springer, Heidelberg (2005)
    • (2005) MMM-ACNS 2005 , vol.3685 , pp. 366-379
    • Gorodetsky, V.1    Karsaev, O.2    Samoilov, V.3    Ulanov, A.4
  • 33
    • 70350716910 scopus 로고    scopus 로고
    • The intrusion detection message exchange format (IDMEF)
    • Debar, H., Curry, D., Feinstein, B.: The Intrusion Detection Message Exchange Format (IDMEF). IETF RFC 4765 (2007)
    • (2007) IETF RFC , vol.4765
    • Debar, H.1    Curry, D.2    Feinstein, B.3
  • 34
    • 26844488270 scopus 로고    scopus 로고
    • PAID: A probabilistic agent-based intrusion detection system
    • Gowadia, V., Farkas, C., Valtorta, M.: PAID: A Probabilistic Agent-Based Intrusion Detection system. Computers & Security 24(7), 529-545 (2005)
    • (2005) Computers & Security , vol.24 , Issue.7 , pp. 529-545
    • Gowadia, V.1    Farkas, C.2    Valtorta, M.3
  • 35
    • 33847299487 scopus 로고    scopus 로고
    • Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction
    • Tsang, C.-H., Kwong, S.: Multi-agent Intrusion Detection System in Industrial Network using Ant Colony Clustering Approach and Unsupervised Feature Extraction. In: IEEE International Conference on Industrial Technology (ICIT 2005), pp. 51-56 (2005)
    • (2005) IEEE International Conference on Industrial Technology (ICIT 2005) , pp. 51-56
    • Tsang, C.-H.1    Kwong, S.2
  • 36
    • 34047255774 scopus 로고    scopus 로고
    • Hybrid multi-agent framework for detection of stealthy probes
    • Mukkamala, S., Sung, A.H., Abraham, A.: Hybrid Multi-agent Framework for Detection of Stealthy Probes. Applied Soft Computing 7(3), 631-641 (2007)
    • (2007) Applied Soft Computing , vol.7 , Issue.3 , pp. 631-641
    • Mukkamala, S.1    Sung, A.H.2    Abraham, A.3
  • 37
    • 78650135042 scopus 로고    scopus 로고
    • MOVIH-IDS: A mobile-visualization hybrid intrusion detection system
    • Herrero, Á., Corchado, E., Pellicer, M.A., Abraham, A.: MOVIH-IDS: A Mobile-Visualization Hybrid Intrusion Detection System. Neurocomputing 72(13-15), 2775-2784 (2009)
    • (2009) Neurocomputing , vol.72 , Issue.13-15 , pp. 2775-2784
    • Herrero, A.1    Corchado, E.2    Pellicer, M.A.3    Abraham, A.4
  • 38
    • 0344012555 scopus 로고    scopus 로고
    • Constructing deliberative agents with case-based reasoning technology
    • Corchado, J.M., Laza, R.: Constructing Deliberative Agents with Case-Based Reasoning Technology. International Journal of Intelligent Systems 18(12), 1227-1241 (2003)
    • (2003) International Journal of Intelligent Systems , vol.18 , Issue.12 , pp. 1227-1241
    • Corchado, J.M.1    Laza, R.2
  • 40
    • 0028401306 scopus 로고
    • Case-based reasoning - Foundational issues, methodological variations, and system approaches
    • Aamodt, A., Plaza, E.: Case-Based Reasoning - Foundational Issues, Methodological Variations, and System Approaches. AI Communications 7(1), 39-59 (1994)
    • (1994) AI Communications , vol.7 , Issue.1 , pp. 39-59
    • Aamodt, A.1    Plaza, E.2
  • 47
    • 0037083574 scopus 로고    scopus 로고
    • Automated discovery of concise predictive rules for intrusion detection
    • Helmer, G., Wong, J.S.K., Honavar, V.G., Miller, L.: Automated Discovery of Concise Predictive Rules for Intrusion Detection. Journal of Systems and Software 60(3), 165-175 (2002)
    • (2002) Journal of Systems and Software , vol.60 , Issue.3 , pp. 165-175
    • Helmer, G.1    Wong, J.S.K.2    Honavar, V.G.3    Miller, L.4
  • 50
    • 3543079858 scopus 로고    scopus 로고
    • Optimizing the scalability of network intrusion detection systems using mobile agents
    • Marks, D.G., Mell, P., Stinson, M.: Optimizing the Scalability of Network Intrusion Detection Systems Using Mobile Agents. Journal of Network and Systems Management 12(1), 95-110 (2004)
    • (2004) Journal of Network and Systems Management , vol.12 , Issue.1 , pp. 95-110
    • Marks, D.G.1    Mell, P.2    Stinson, M.3
  • 51
    • 35048820538 scopus 로고    scopus 로고
    • APHIDS: A mobile agent-based programmable hybrid intrusion detection system
    • Karmouch, A., Korba, L., Madeira, E.R.M. (eds.) LNCS Springer, Heidelberg
    • Deeter, K., Singh, K., Wilson, S., Filipozzi, L., Vuong, S.T.: APHIDS: A mobile agent-based programmable hybrid intrusion detection system. In: Karmouch, A., Korba, L., Madeira, E.R.M. (eds.) MATA 2004. LNCS, Vol. 3284, pp. 244-253. Springer, Heidelberg (2004)
    • (2004) MATA 2004 , vol.3284 , pp. 244-253
    • Deeter, K.1    Singh, K.2    Wilson, S.3    Filipozzi, L.4    Vuong, S.T.5
  • 52
    • 33646535645 scopus 로고    scopus 로고
    • APHIDS++: Evolution of A programmable hybrid intrusion detection system
    • Magedanz, T., Karmouch, A., Pierre, S., Venieris, I.S. (eds.) LNCS Springer, Heidelberg
    • Alam, M.S., Gupta, A., Wires, J., Vuong, S.T.: APHIDS++: Evolution of A programmable hybrid intrusion detection system. In: Magedanz, T., Karmouch, A., Pierre, S., Venieris, I.S. (eds.) MATA 2005. LNCS, Vol. 3744, pp. 22-31. Springer, Heidelberg (2005)
    • (2005) MATA 2005 , vol.3744 , pp. 22-31
    • Alam, M.S.1    Gupta, A.2    Wires, J.3    Vuong, S.T.4
  • 53
    • 33745317862 scopus 로고    scopus 로고
    • A mobile agent approach to intrusion detection in network systems
    • Khosla, R., Howlett, R.J., Jain, L.C. (eds.) LNCS (LNAI) Springer, Heidelberg
    • Kolaczek, G., Pieczynska-Kuchtiak, A., Juszczyszyn, K., Grzech, A., Katarzyniak, R.P., Nguyen, N.T.: A mobile agent approach to intrusion detection in network systems. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), Vol. 3682, pp. 514-519. Springer, Heidelberg (2005)
    • (2005) KES 2005 , vol.3682 , pp. 514-519
    • Kolaczek, G.1    Pieczynska-Kuchtiak, A.2    Juszczyszyn, K.3    Grzech, A.4    Katarzyniak, R.P.5    Nguyen, N.T.6
  • 56
    • 33745660126 scopus 로고    scopus 로고
    • Mobile agents for network intrusion resistance
    • Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) LNCS Springer, Heidelberg
    • Wang, H.Q., Wang, Z.Q., Zhao, Q., Wang, G.F., Zheng, R.J., Liu, D.X.: Mobile agents for network intrusion resistance. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, Vol. 3842, pp. 965-970. Springer, Heidelberg (2006)
    • (2006) APWeb Workshops 2006 , vol.3842 , pp. 965-970
    • Wang, H.Q.1    Wang, Z.Q.2    Zhao, Q.3    Wang, G.F.4    Zheng, R.J.5    Liu, D.X.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.