메뉴 건너뛰기




Volumn 2, Issue 2, 2010, Pages 128-140

An agent-based intrusion detection system for local area networks

Author keywords

Agents; Bayesian network; Byzantine agreement protocol; Distributed intrusion detection; Distributed trust management; Fault tolerance; MSBN; Multi agent systems

Indexed keywords


EID: 80053481651     PISSN: 20760930     EISSN: 2073607X     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (20)

References (53)
  • 4
    • 84990616603 scopus 로고
    • Multiply Sectioned Bayesian Networks and Junction Forest for Large Knowledge-Based Systems
    • Y. Xiang, D. Poole, and M. Beddoes, "Multiply Sectioned Bayesian Networks and Junction Forest for Large Knowledge-Based Systems", Computational Intelligence, 9(2): 171-220, 1993.
    • (1993) Computational Intelligence , vol.9 , Issue.2 , pp. 171-220
    • Xiang, Y.1    Poole, D.2    Beddoes, M.3
  • 5
    • 0001006209 scopus 로고
    • Local Computations with Probabilities on Graphical Structures and their Applications to Expert Systems
    • S.L. Lauritzen and D.J. Spiegelhalter, "Local Computations with Probabilities on Graphical Structures and their Applications to Expert Systems", in Proceedings of the Royal Statistical Society, Series B, 50, 1988, pp. 154-227.
    • (1988) Proceedings of the Royal Statistical Society, Series B , vol.50 , pp. 154-227
    • Lauritzen, S.L.1    Spiegelhalter, D.J.2
  • 9
    • 0034300682 scopus 로고    scopus 로고
    • Intrusion Detection using Autonomous agents
    • October
    • E. Spafford and D. Zamboni, "Intrusion Detection using Autonomous agents", Computer Networks, 34 (4): 547-570, October 2000.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 547-570
    • Spafford, E.1    Zamboni, D.2
  • 13
    • 0034316644 scopus 로고    scopus 로고
    • Modeling Requests among Cooperating Intrusion Detection Systems
    • P. Ning, X. S. Wang, and S. Jajodia, "Modeling Requests among Cooperating Intrusion Detection Systems", Computer Communications, 23(17): 1702-1715, 2000.
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1702-1715
    • Ning, P.1    Wang, X.S.2    Jajodia, S.3
  • 16
  • 22
    • 80053558901 scopus 로고    scopus 로고
    • Master Thesis, School of Computer Science and Software Engineering, University of Wollongong, Australia
    • D. Ye, "An Agent-Based Framework for Distributed Intrusion Detections", Master Thesis, School of Computer Science and Software Engineering, University of Wollongong, Australia, 2009.
    • (2009) An Agent-Based Framework for Distributed Intrusion Detections
    • Ye, D.1
  • 24
    • 80053549000 scopus 로고    scopus 로고
    • Agent-Based Intrusion Detection for Network-Based Application
    • May
    • J. Zeng and D. Guo, "Agent-Based Intrusion Detection for Network-Based Application", International Journal of Network Security, Vol. 8, No. 3, pp. 201-210, May 2009.
    • (2009) International Journal of Network Security , vol.8 , Issue.3 , pp. 201-210
    • Zeng, J.1    Guo, D.2
  • 32
    • 0030284198 scopus 로고    scopus 로고
    • A Probabilistic Framework for Cooperative Multiagent Distributed Interpretation and Optimization of Communication
    • Y. Xiang. "A Probabilistic Framework for Cooperative Multiagent Distributed Interpretation and Optimization of Communication", Artificial Intelligence, 87 (1-2); 295-342, 1996.
    • (1996) Artificial Intelligence , vol.87 , Issue.1-2 , pp. 295-342
    • Xiang, Y.1
  • 33
    • 0038729631 scopus 로고    scopus 로고
    • Comparison of Multiagent Inference Methods in Multiply Sectioned Bayesian Networks
    • August
    • Y. Xiang. "Comparison of Multiagent Inference Methods in Multiply Sectioned Bayesian Networks", International Journal of Approximate Reasoning, 33(3): 235-254, August 2003.
    • (2003) International Journal of Approximate Reasoning , vol.33 , Issue.3 , pp. 235-254
    • Xiang, Y.1
  • 38
    • 0442296744 scopus 로고    scopus 로고
    • A Bayesian Paradigm for Designing Intrusion Detection System
    • February
    • S.L. Scott, "A Bayesian Paradigm for Designing Intrusion Detection System", Computational Statistics and Data Analysis, 45(1): 69-83, February 2004.
    • (2004) Computational Statistics and Data Analysis , vol.45 , Issue.1 , pp. 69-83
    • Scott, S.L.1
  • 40
    • 84903437824 scopus 로고    scopus 로고
    • URL
    • FIPA-OS Developers Guide. URL: http://fipaos.sourceforge.net/docs/Developers_Guide.pdf.
    • FIPA-OS Developers Guide
  • 44
    • 0033916466 scopus 로고    scopus 로고
    • Belief Updating in Multiply Sectioned Bayesian Networks without Repeated Local Propagation
    • Y. Xiang, "Belief Updating in Multiply Sectioned Bayesian Networks without Repeated Local Propagation", International Journal of Approximate Reasoning 23:1-21, 2000.
    • (2000) International Journal of Approximate Reasoning , vol.23 , pp. 1-21
    • Xiang, Y.1
  • 45
    • 0025401005 scopus 로고
    • The Computational Complexity of Probabilistic Inference using Bayesian Belief Networks
    • G.F. Cooper, "The Computational Complexity of Probabilistic Inference using Bayesian Belief Networks", Artificial Intelligence, 42: 393-405, 1990.
    • (1990) Artificial Intelligence , vol.42 , pp. 393-405
    • Cooper, G.F.1
  • 46
    • 0028483915 scopus 로고
    • Finding Maps for Belief Networks is NPHard
    • S. Shimony, "Finding Maps for Belief Networks is NPHard", Artificial Intelligence, 68: 399-410, 1994.
    • (1994) Artificial Intelligence , vol.68 , pp. 399-410
    • Shimony, S.1
  • 48
    • 36348976957 scopus 로고    scopus 로고
    • Masters Dissertation in Computer Science, Worcester Polytechnic Institute, December
    • D.M. Toth, The Byzantine Agreement Protocol Applied to Security, Masters Dissertation in Computer Science, Worcester Polytechnic Institute, December 2004.
    • (2004) The Byzantine Agreement Protocol Applied to Security
    • Toth, D.M.1
  • 49
    • 84888391834 scopus 로고    scopus 로고
    • URL. DARPA Intrusion Data Repository
    • Kddcup 99 Intrusion Detection Data Set. URL: http://kdd.ics.uci.edu/databases/kddcup99/kddcup.data_10_percent.gz. DARPA Intrusion Data Repository.
    • (2012) Kddcup 99 Intrusion Detection Data Set
  • 50
    • 80053532199 scopus 로고    scopus 로고
    • URL. DARPA Intrusion Data Repository
    • MIT Lincoln Laboratory. URL: http://www.ll.mit.edu/IST/ideval/. DARPA Intrusion Data Repository.
    • (2012) MIT Lincoln Laboratory


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.