-
2
-
-
24344493979
-
CIDS: An agent-based intrusion detection system
-
Dasgupta, D., Gonzalez, F., Yallapu, K., Gomez, J., et al.: CIDS: An agent-based intrusion detection system. Computer and Security: Science Direct 24(5), 387–398 (2005)
-
(2005)
Computer and Security: Science Direct
, vol.24
, Issue.5
, pp. 387-398
-
-
Dasgupta, D.1
Gonzalez, F.2
Yallapu, K.3
Gomez, J.4
-
3
-
-
34548453089
-
An agent based and biological inspired real-time intrusion detection and security model for computer network operations
-
Boukerche, A., Machado, R., Juc, K.: An agent based and biological inspired real-time intrusion detection and security model for computer network operations. Butterworth-Heinemann, 2649–2660 (2007)
-
(2007)
Butterworth-Heinemann
, pp. 2649-2660
-
-
Boukerche, A.1
Machado, R.2
Juc, K.3
-
4
-
-
84961904275
-
A Proposed Multi-Agent System for Intrusion Detection System in a Complex Network
-
Al-Hamami, A.H., Hashem, S.H.: A Proposed Multi-Agent System for Intrusion Detection System in a Complex Network. In: Information and Communication Technologies, ICTTA 2006, vol. 2, pp. 3552–3556 (2006)
-
(2006)
Information and Communication Technologies, ICTTA 2006
, vol.2
, pp. 3552-3556
-
-
Al-Hamami, A.H.1
Hashem, S.H.2
-
5
-
-
0034300682
-
Intrusion detection using autonomous agents
-
Spafford, E., Zamboni, D.: Intrusion detection using autonomous agents. Computer Networks 34(4), 547–570 (2000)
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 547-570
-
-
Spafford, E.1
Zamboni, D.2
-
6
-
-
43449104762
-
Autonomous decision on intrusion detection with trained BDI agents
-
Orfila, A., Carbo, J., Ribagorda, A.: Autonomous decision on intrusion detection with trained BDI agents. Butterworth-Heinemann, 1803–1813 (2008)
-
(2008)
Butterworth-Heinemann
, pp. 1803-1813
-
-
Orfila, A.1
Carbo, J.2
Ribagorda, A.3
-
7
-
-
79960683222
-
-
Springer, Heidelberg
-
Herrero, A., Corchado, E., Pellicer, M., Abraham, A.: Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization in Innovations in Hybrid Intelligent Systems, pp. 320–328. Springer, Heidelberg (2008)
-
(2008)
Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization in Innovations in Hybrid Intelligent Systems
, pp. 320-328
-
-
Herrero, A.1
Corchado, E.2
Pellicer, M.3
Abraham, A.4
-
10
-
-
32044432531
-
A New Mobile Agent-Based Intrusion detection System Using distributed Sensors
-
Eid, M.: A New Mobile Agent-Based Intrusion detection System Using distributed Sensors. In: Proceeding of FEASC, pp. 114–125 (2004)
-
(2004)
Proceeding of FEASC
, pp. 114-125
-
-
Eid, M.1
-
11
-
-
50149093146
-
Neural Network Ensembles for Intrusion Detection
-
Golovko, V., Kachurka, P., Vaitsekhovich, L.: Neural Network Ensembles for Intrusion Detection. In: 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2007, pp. 578–583 (2007)
-
(2007)
4Th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2007
, pp. 578-583
-
-
Golovko, V.1
Kachurka, P.2
Vaitsekhovich, L.3
-
13
-
-
33745163595
-
Learning intrusion detection: Supervised or unsupervised?
-
In: Roli, F., Vitulano, S. (eds.), Springer, Heidelberg
-
Laskov, P., Dussel, P., Schafer, C., Rieck, K.: Learning intrusion detection: Supervised or unsupervised? In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, vol. 3617, pp. 50–57. Springer, Heidelberg (2005)
-
(2005)
ICIAP 2005. LNCS
, vol.3617
, pp. 50-57
-
-
Laskov, P.1
Dussel, P.2
Schafer, C.3
Rieck, K.4
-
14
-
-
85006510441
-
Sistema Neuronal de Detección de Intrusos
-
Zapata, C.M.y.G. (ed.)
-
Duque, N., Bonilla, C.M., Bohorquez, D., Isaza, G.: Sistema Neuronal de Detección de Intrusos. In: Zapata, C.M.y.G. (ed.) Tendencias en Ingeniería de Software e Inteligencia Artificial, G.M: Medellin (Colombia), vol. 2, pp. 99–105 (2008)
-
(2008)
Tendencias En Ingeniería De Software E Inteligencia Artificial, G.M: Medellin (Colombia)
, vol.2
, pp. 99-105
-
-
Duque, N.1
Bonilla, C.M.2
Bohorquez, D.3
Isaza, G.4
-
15
-
-
35548992415
-
-
Pergamon Press, Inc., Oxford
-
Abadeh, M., Habibi, J., Barzegar, Z., Sergi, M.: A parallel genetic local search algorithm for intrusion detection in computer networks, pp. 1058–1069. Pergamon Press, Inc., Oxford (2007)
-
(2007)
A Parallel Genetic Local Search Algorithm for Intrusion Detection in Computer Networks
, pp. 1058-1069
-
-
Abadeh, M.1
Habibi, J.2
Barzegar, Z.3
Sergi, M.4
-
16
-
-
0003032564
-
Decision Tree for Signature Recognition and State Classification
-
West Point, New York
-
Ye, N., Li, X., Emran, S.: Decision Tree for Signature Recognition and State Classification. In: IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, New York, pp. 194–199 (2000)
-
(2000)
IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop
, pp. 194-199
-
-
Ye, N.1
Li, X.2
Emran, S.3
-
17
-
-
84902235620
-
Intensive Use of Bayesian Belief Networks for the Unified, Flexible and Adaptable Analysis of Misuses and Anomalies in Network Intrusion Detection and Prevention Systems
-
Los Alamitos
-
Garcia, P.: Intensive Use of Bayesian Belief Networks for the Unified, Flexible and Adaptable Analysis of Misuses and Anomalies in Network Intrusion Detection and Prevention Systems. In: Proceedings of the 18th International Conference on Database and Expert Systems Applications. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
Proceedings of the 18Th International Conference on Database and Expert Systems Applications. IEEE Computer Society
-
-
Garcia, P.1
-
19
-
-
84893946320
-
Unsupervised SVM Based on p-kernels for Anomaly Detection
-
IEEE Computer Society, Los Alamitos
-
Li, K., Teng, G.: Unsupervised SVM Based on p-kernels for Anomaly Detection. In: Proceedings of the First International Conference on Innovative Computing, Information and Control, vol. 2. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
Proceedings of the First International Conference on Innovative Computing, Information and Control
, vol.2
-
-
Li, K.1
Teng, G.2
-
20
-
-
85006358289
-
Un marco inteligente para el análisis de tráfico generado por gusanos en internet
-
Salamanca
-
Zurutuza, U., Uribeetxeberria, R., Fernández, I., Zamboni, D.: Un marco inteligente para el análisis de tráfico generado por gusanos en internet. In: XRECSI X Reunión Espanola sobre Criptología y Seguridad de la Información, Salamanca, pp. 607–618 (2008)
-
(2008)
XRECSI X Reunión Espanola Sobre Criptología Y Seguridad De La Información
, pp. 607-618
-
-
Zurutuza, U.1
Uribeetxeberria, R.2
Fernández, I.3
Zamboni, D.4
-
21
-
-
67649764420
-
Combined Data Mining Approach for Intrusion Detection
-
Barcelona, Spain
-
Zurutuza, U., Uribeetxeberria, R., Azketa, E., Gil, G., et al.: Combined Data Mining Approach for Intrusion Detection. In: International Conference on Security and Criptography, Barcelona, Spain (2008)
-
(2008)
International Conference on Security and Criptography
-
-
Zurutuza, U.1
Uribeetxeberria, R.2
Azketa, E.3
Gil, G.4
-
22
-
-
10844230994
-
Intrusion detection using an ensem-ble of intelligent paradigms
-
Mukkamala, S., Sung, A.H., Abraham, A.: Intrusion detection using an ensem-ble of intelligent paradigms. Journal of Network and Computer Applications 28(2), 167–182 (2005)
-
(2005)
Journal of Network and Computer Applications
, vol.28
, Issue.2
, pp. 167-182
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
-
23
-
-
34247636165
-
-
Elsevier Science Inc., Amsterdam
-
Tsang, C., Kwong, S., Wang, H.: Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection, pp. 2373–2391. Elsevier Science Inc., Amsterdam (2007)
-
(2007)
Genetic-Fuzzy Rule Mining Approach and Evaluation of Feature Selection Techniques for Anomaly Intrusion Detection
, pp. 2373-2391
-
-
Tsang, C.1
Kwong, S.2
Wang, H.3
-
24
-
-
26944484588
-
Modeling Computer Attacks: An Ontology for Intrusion Detection
-
In: Vigna, G., Krügel, C., Jonsson, E. (eds.), Springer, Heidelberg
-
Undercoffer, J., Joshi, A., Pinkston, J.: Modeling Computer Attacks: An Ontology for Intrusion Detection. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 113–135. Springer, Heidelberg (2003)
-
(2003)
RAID 2003. LNCS
, vol.2820
, pp. 113-135
-
-
Undercoffer, J.1
Joshi, A.2
Pinkston, J.3
-
25
-
-
19544387383
-
A target centric ontology for intrusion detection: Using DAML+OIL to classify intrusive behaviors
-
Cambridge University Press, Cambridge
-
Undercoffer, J., Finin, T., Joshi, A., Pinkston, J.: A target centric ontology for intrusion detection: using DAML+OIL to classify intrusive behaviors. In: Knowledge Engineering Review - Special Issue on Ontologies for Distributed Systems, pp. 2–22. Cambridge University Press, Cambridge (2005)
-
(2005)
Knowledge Engineering Review - Special Issue on Ontologies for Distributed Systems
, pp. 2-22
-
-
Undercoffer, J.1
Finin, T.2
Joshi, A.3
Pinkston, J.4
-
26
-
-
33746519172
-
An ontology-based multiagent approach to outbound intrusion detection
-
Mandujano, S., Galvan, A., Nolazco, J.: An ontology-based multiagent approach to outbound intrusion detection. In: The 3rd ACS/IEEE International Conference on Computer Systems and Applications, p. 94 (2005)
-
(2005)
The 3Rd ACS/IEEE International Conference on Computer Systems and Applications
, pp. 94
-
-
Mandujano, S.1
Galvan, A.2
Nolazco, J.3
-
28
-
-
85006344402
-
Aplicación de Redes Neuronales para la detección de intrusos en redes y sistemas de información
-
Perez, C., Isaza, G., Brito, J.: Aplicación de Redes Neuronales para la detección de intrusos en redes y sistemas de información. Scientia et Technica XI(27), 225–230 (2005)
-
(2005)
Scientia Et Technica
, vol.9
, Issue.27
, pp. 225-230
-
-
Perez, C.1
Isaza, G.2
Brito, J.3
-
29
-
-
85006399043
-
Neural Network ToolboxTM 6.0 Design and simulate neural networks
-
Math Works. Neural Network ToolboxTM 6.0 Design and simulate neural networks. Consulted: 2008 (2008), http://www.mathworks.com/products/neuralnet/
-
(2008)
Consulted
, pp. 2008
-
-
-
30
-
-
85006451348
-
-
University of Tübingen, Wilhelm-Schickard-Institute for Computer Science, Department of Computer Architecture
-
Fischer, I., Hennecke, F., Bannes, C., Zell, A.: User Manual, versión 1.1 of JAVA-NNS (Java Neural Network Simulator), University of Tübingen, Wilhelm-Schickard-Institute for Computer Science, Department of Computer Architecture (2002)
-
(2002)
User Manual, versión 1.1 of JAVA-NNS (Java Neural Network Simulator)
-
-
Fischer, I.1
Hennecke, F.2
Bannes, C.3
Zell, A.4
-
31
-
-
85006346953
-
DARPA Intrusion Detection Evaluation, The 1999 DARPA off-line intrusion detection evaluation, LINCOLN LABORATORY Massachusetts Institute of Technology
-
DARPA. DARPA Intrusion Detection Evaluation, The 1999 DARPA off-line intrusion detection evaluation, LINCOLN LABORATORY Massachusetts Institute of Technology. Consulted (2008), http://www.ll.mit.edu/IST/ideval/data/1999/1999_data_index.html
-
(2008)
Consulted
-
-
-
32
-
-
85006442917
-
-
Herve, C.: IDSWakeUP. Consulted: 2008 (2002), http://www.hsc.fr/ressources/outils/idswakeup/index.html.en
-
(2002)
Idswakeup. Consulted
, pp. 2008
-
-
Herve, C.1
-
33
-
-
33750727910
-
-
Department of Computer Science University of California, Santa Barbara
-
Mutz, D., Vigna, G., Kemmerer, R.: An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems, Department of Computer Science University of California, Santa Barbara (2003)
-
(2003)
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems
-
-
Mutz, D.1
Vigna, G.2
Kemmerer, R.3
-
34
-
-
85006456599
-
Developing Multi-Agent Systems with JADE
-
LuigiBellifemine, F., Caire, G., Greenwoo, D.: Developing Multi-Agent Systems with JADE. Wiley Series in Agent Technology, vol. 2008 (2007)
-
(2007)
Wiley Series in Agent Technology, Vol
, pp. 2008
-
-
Luigibellifemine, F.1
Caire, G.2
Greenwoo, D.3
-
35
-
-
0004225165
-
Intrusion Detection Message Exchange Format. Intrusion Detection Working Group – Internet Engineering Task Force
-
Curry, D.A., Debar, H., Feinstein, B.S.: Intrusion Detection Message Exchange Format. Intrusion Detection Working Group – Internet Engineering Task Force, Internet Draft (2004)
-
(2004)
Internet Draft
-
-
Curry, D.A.1
Debar, H.2
Feinstein, B.S.3
-
36
-
-
85006492119
-
Jena – A Semantic Web Framework for Java
-
JENA. Jena – A Semantic Web Framework for Java. Consulted: Enero 2008 (2007), http://jena.sourceforge.net/
-
(2007)
Consulted: Enero 2008
-
-
|