To see the other types of publications on this topic, follow the link: Agent Based Intrusion Detection System (AIDS).

Journal articles on the topic 'Agent Based Intrusion Detection System (AIDS)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Agent Based Intrusion Detection System (AIDS).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

J., K. Mandal, and Lutful Hassan Khondekar. "A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET." International Journal of Network Security & Its Applications (IJNSA) 5, no. 5 (2013): 179–83. https://doi.org/10.5281/zenodo.5602381.

Full text
Abstract:
In this paper a novel technique has been proposed for intrusion detection in MANET, where agents are fired from a node for each node randomly and detect the defective nodes. Detection is based on triangular encryption technique (TE)[9,10], and AODV[1,2,3,8] is taken as routing protocol. The scheme is an ‘Agent’ based intrusion detection system. This technique is applied on two types of defective nodes namely packet sinking and black hole attack. For simulation purpose we have taken NS2 (2.33) and three type of parameters are considered. These are number of nodes, percentage of node
APA, Harvard, Vancouver, ISO, and other styles
2

Tiwari, S. K., D. S. Pandey, and V. Namdeo. "A Real Time Approach to Strengthen Computer Security By Host Cum Network Agent Based Intrusion Detection System (HCN-AIDS)." International Journal of Computer Sciences and Engineering 6, no. 7 (2018): 204–10. http://dx.doi.org/10.26438/ijcse/v6i7.204210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dasgupta, D., F. Gonzalez, K. Yallapu, J. Gomez, and R. Yarramsettii. "CIDS: An agent-based intrusion detection system." Computers & Security 24, no. 5 (2005): 387–98. http://dx.doi.org/10.1016/j.cose.2005.01.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Xie, Ping, and Wei Wang. "The Study and Simulation on Campus Network Intrusion Detection System." Advanced Materials Research 490-495 (March 2012): 2657–61. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.2657.

Full text
Abstract:
In this paper, the current intrusion detection systems are analyzed in the full study of the development trend of domestic and foreign country. According to the campus network can be divided into functional independence of the structural characteristics of the subnet, while taking full advantage of agent technology in the intrusion detection system technology, we have referenced to the agent technology and a variety of detection methods for the analysis and comparison, and have analyzed the existing distributed intrusion detection system ,we propose a monitoring and management center with a mu
APA, Harvard, Vancouver, ISO, and other styles
5

Hegazy, I. M., T. Al-Arif, Z. T. Fayed, and H. M. Faheem. "A multi-agent based system for intrusion detection." IEEE Potentials 22, no. 4 (2003): 28–31. http://dx.doi.org/10.1109/mp.2003.1238690.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gowadia, Vaibhav, Csilla Farkas, and Marco Valtorta. "PAID: A Probabilistic Agent-Based Intrusion Detection system." Computers & Security 24, no. 7 (2005): 529–45. http://dx.doi.org/10.1016/j.cose.2005.06.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Yang Bin, Liang Shi, Bei Zhan Wang, Yuan Qin Wu, and Pan Hong Wang. "An New Agent Based Distributed Adaptive Intrusion Detection System." Advanced Materials Research 532-533 (June 2012): 624–29. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.624.

Full text
Abstract:
In order to overcome the excessive dependence among the traditional intrusion detection system components, high rate false-alarm phenomenon caused by multiple alarms to the same invasion, inability to adaptively replace mining algorithm when testing environment has changed and other issues, this paper puts forward an Agent based distributed adaptive intrusion detection system, which employs Joint Detection mechanism for mining algorithm module, and Dynamic Election algorithm for the recovery mechanism, thereby improving the system adaptive ability to the external change.
APA, Harvard, Vancouver, ISO, and other styles
8

Cai, Yu. "Mobile Agent Based Network Defense System in Enterprise Network." International Journal of Handheld Computing Research 2, no. 1 (2011): 41–54. http://dx.doi.org/10.4018/jhcr.2011010103.

Full text
Abstract:
Security has become the Achilles’ heel of many organizations in today’s computer-dominated society. In this paper, a configurable intrusion detection and response framework named Mobile Agents based Distributed (MAD) security system was proposed for enterprise network consisting of a large number of mobile and handheld devices. The key idea of MAD is to use autonomous mobile agents as lightweight entities to provide unified interfaces for intrusion detection, intrusion response, information fusion, and dynamic reconfiguration. These lightweight agents can be easily installed and managed on mob
APA, Harvard, Vancouver, ISO, and other styles
9

Qasim, Awais, Muhammad Bilal, Adeel Munawar, and Shuja Ur Rehman Baig. "Blockchain based intrusion detection in agent-driven flight operations." Multiagent and Grid Systems 20, no. 2 (2024): 161–83. http://dx.doi.org/10.3233/mgs-240017.

Full text
Abstract:
Security and protection of the data is the core objective of every organization, but since cyber-attacks got more advanced than ever before, the data is compromised more often, resulting in financial loss, life loss, or privacy breaches as its consequences. There must be a system that can deal with the increasing number of cyber-attacks in flight operations, which are increasing in numbers and sophistication. Since we know that the traditional intrusion detection system is not capable enough to protect the data and as many human lives are at stake in flight operations, an unfortunate data corr
APA, Harvard, Vancouver, ISO, and other styles
10

Alazab, Ammar, Michael Hobbs, Jemal Abawajy, and Ansam Khraisat. "Malware Detection and Prevention System Based on Multi-Stage Rules." International Journal of Information Security and Privacy 7, no. 2 (2013): 29–43. http://dx.doi.org/10.4018/jisp.2013040102.

Full text
Abstract:
The continuously rising Internet attacks pose severe challenges to develop an effective Intrusion Detection System (IDS) to detect known and unknown malicious attack. In order to address the problem of detecting known, unknown attacks and identify an attack grouped, the authors provide a new multi stage rules for detecting anomalies in multi-stage rules. The authors used the RIPPER for rule generation, which is capable to create rule sets more quickly and can determine the attack types with smaller numbers of rules. These rules would be efficient to apply for Signature Intrusion Detection Syst
APA, Harvard, Vancouver, ISO, and other styles
11

Cai, Yan Jing, Xian Yi Cheng, and Yan Pan. "Solutions of Single Point of Failure in Intrusion Detection System." Applied Mechanics and Materials 128-129 (October 2011): 285–88. http://dx.doi.org/10.4028/www.scientific.net/amm.128-129.285.

Full text
Abstract:
In this paper, Mobile Agent (MA) and a number of intrusion detection system described. Considering the shortcoming of the current intrusion detection system, a new system called the intrusion detection system based on MA was described. Using the autonomy of MA, Intrusion Detection System based on MA avoids single-point failure, and robusts the system. As a result, the security of network has been increased.
APA, Harvard, Vancouver, ISO, and other styles
12

SODIYA, ADESINA SIMON. "MULTI-LEVEL AND SECURED AGENT-BASED INTRUSION DETECTION SYSTEM." Journal of Computing and Information Technology 14, no. 3 (2006): 217. http://dx.doi.org/10.2498/cit.2006.03.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Wang, Jin. "An Autonomous Agent-Based Adaptive Distributed Intrusion Detection System." Journal of Computer Research and Development 42, no. 11 (2005): 1934. http://dx.doi.org/10.1360/crad20051116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Renjit, J. Arokia. "Distributed and cooperative multi-agent based intrusion detection system." Indian Journal of Science and Technology 3, no. 10 (2010): 1070–74. http://dx.doi.org/10.17485/ijst/2010/v3i10.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Singh, Arjun, Surbhi Chauhan, Kamal Kant, and Reshma Dokania. "Agent based Decentralized and Fault Tolerant Intrusion Detection System." International Journal of Computer Applications 47, no. 1 (2012): 1–6. http://dx.doi.org/10.5120/7149-9850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Chen, Hai Yan. "Development and Design of Intelligent Intrusion Detection System Based on Data Mining." Applied Mechanics and Materials 602-605 (August 2014): 1526–29. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.1526.

Full text
Abstract:
With the popularization and development of Internet, the network has penetrated into every corner of social life. Network brings people convenient but at the same time it also brings a series of safety problems. Intrusion detection system is an important part of network security system. Computer security problem is increasingly prominent, which puts forward higher requirements on intrusion detection system. In this paper, the application of data mining and intelligent Agent detection in the intrusion detection system is researched.
APA, Harvard, Vancouver, ISO, and other styles
17

Alazab, Ammar, Michael Hobbs, Jemal Abawajy, Ansam Khraisat, and Mamoun Alazab. "Using response action with intelligent intrusion detection and prevention system against web application malware." Information Management & Computer Security 22, no. 5 (2014): 431–49. http://dx.doi.org/10.1108/imcs-02-2013-0007.

Full text
Abstract:
Purpose – The purpose of this paper is to mitigate vulnerabilities in web applications, security detection and prevention are the most important mechanisms for security. However, most existing research focuses on how to prevent an attack at the web application layer, with less work dedicated to setting up a response action if a possible attack happened. Design/methodology/approach – A combination of a Signature-based Intrusion Detection System (SIDS) and an Anomaly-based Intrusion Detection System (AIDS), namely, the Intelligent Intrusion Detection and Prevention System (IIDPS). Findings – Aft
APA, Harvard, Vancouver, ISO, and other styles
18

Ganapathy, S., P. Yogesh, and A. Kannan. "Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM." Computational Intelligence and Neuroscience 2012 (2012): 1–10. http://dx.doi.org/10.1155/2012/850259.

Full text
Abstract:
Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two ne
APA, Harvard, Vancouver, ISO, and other styles
19

Rey, E. Mosqueira, A. Alonso Betanzos, B. Guijarro Berdinas, D. Alonso Rios, and J. Lago Pineiro. "A Snort-based agent for a JADE multi-agent intrusion detection system." International Journal of Intelligent Information and Database Systems 3, no. 1 (2009): 107. http://dx.doi.org/10.1504/ijiids.2009.023041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Zachos, Georgios, Ismael Essop, Georgios Mantas, Kyriakos Porfyrakis, José C. Ribeiro, and Jonathan Rodriguez. "An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks." Electronics 10, no. 21 (2021): 2562. http://dx.doi.org/10.3390/electronics10212562.

Full text
Abstract:
Over the past few years, the healthcare sector is being transformed due to the rise of the Internet of Things (IoT) and the introduction of the Internet of Medical Things (IoMT) technology, whose purpose is the improvement of the patient’s quality of life. Nevertheless, the heterogenous and resource-constrained characteristics of IoMT networks make them vulnerable to a wide range of threats. Thus, novel security mechanisms, such as accurate and efficient anomaly-based intrusion detection systems (AIDSs), considering the inherent limitations of the IoMT networks, need to be developed before IoM
APA, Harvard, Vancouver, ISO, and other styles
21

Zeng, Xia Ling. "Cluster-Based Intrusion Detection Model for Wireless Sensor Network." Applied Mechanics and Materials 631-632 (September 2014): 914–17. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.914.

Full text
Abstract:
An intrusion detection system (IDS) using agent technology was designed for wireless sensor network of clustering structure. An IDS agent which includes two different agents was deployed in every node of network. One is local detection agent and another is global detection agent. They complete different tasks of detection. Based on Bluetooth communication technology, Bluetooth scattering network formation algorithm TPSF was employed to construct the cluster layer of sensor network and to finish task assignment of different agents. The TPSF algorithm was improved by limiting the role of nodes t
APA, Harvard, Vancouver, ISO, and other styles
22

Achbarou, Omar, My Ahmed El Kiram, and Salim Elbouanani. "Cloud Security: A Multi Agent Approach Based Intrusion Detection System." Indian Journal of Science and Technology 10, no. 18 (2017): 1–6. http://dx.doi.org/10.17485/ijst/2017/v10i18/109044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Jain, Chandrakant, and Aumreesh Kumar Saxena. "General Study of Mobile Agent Based Intrusion Detection System (IDS)." Journal of Computer and Communications 04, no. 04 (2016): 93–98. http://dx.doi.org/10.4236/jcc.2016.44008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Nakkeeran, R., T. Aruldoss Albert, and R. Ezumalai. "Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks." International Journal of Engineering and Technology 2, no. 1 (2010): 52–56. http://dx.doi.org/10.7763/ijet.2010.v2.99.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Khraisat, Ansam, Iqbal Gondal, Peter Vamplew, Joarder Kamruzzaman, and Ammar Alazab. "Hybrid Intrusion Detection System Based on the Stacking Ensemble of C5 Decision Tree Classifier and One Class Support Vector Machine." Electronics 9, no. 1 (2020): 173. http://dx.doi.org/10.3390/electronics9010173.

Full text
Abstract:
Cyberttacks are becoming increasingly sophisticated, necessitating the efficient intrusion detection mechanisms to monitor computer resources and generate reports on anomalous or suspicious activities. Many Intrusion Detection Systems (IDSs) use a single classifier for identifying intrusions. Single classifier IDSs are unable to achieve high accuracy and low false alarm rates due to polymorphic, metamorphic, and zero-day behaviors of malware. In this paper, a Hybrid IDS (HIDS) is proposed by combining the C5 decision tree classifier and One Class Support Vector Machine (OC-SVM). HIDS combines
APA, Harvard, Vancouver, ISO, and other styles
26

Liu, Zhi Yue, and Jian Wang. "A Research into an Intrusion Detection System Based on Immune Principle and Multi-Agent in WSN." Advanced Materials Research 433-440 (January 2012): 5157–61. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.5157.

Full text
Abstract:
Along with deep-going researches and practical applications of Wireless Sensor Network, security issues contained therein are raising a growing concern. Based on a systematic analysis of the current intrusion detection system and with integration between the mechanism of artificial immune system and multi-agent technology, the paper provides with a new model of an intrusion detection system based on artificial immune system and multi-agent technology, and further introduces the functions of agents in the model as well as the process of antibody selection.
APA, Harvard, Vancouver, ISO, and other styles
27

Khraisat, Gondal, Vamplew, Kamruzzaman, and Alazab. "A novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks." Electronics 8, no. 11 (2019): 1210. http://dx.doi.org/10.3390/electronics8111210.

Full text
Abstract:
The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack to the end nodes. Due to the large number and diverse types of IoT devices, it is a challenging task to protect the IoT infrastructure using a traditional intrusion detection system. To protect IoT devices, a novel ensemble Hybrid Intrusion Detection System (HIDS) is proposed by combining a C5 classifier and One Cl
APA, Harvard, Vancouver, ISO, and other styles
28

Bajtoš, Tomáš, Andrej Gajdoš, Lenka Kleinová, Katarína Lučivjanská, and Pavol Sokol. "Network Intrusion Detection with Threat Agent Profiling." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/3614093.

Full text
Abstract:
With the increase in usage of computer systems and computer networks, the problem of intrusion detection in network security has become an important issue. In this paper, we discuss approaches that simplify network administrator’s work. We applied clustering methods for security incident profiling. We considerK-means, PAM, and CLARA clustering algorithms. For this purpose, we used data collected in Warden system from various security tools. We do not aim to differentiate between normal and abnormal network traffic, but we focus on grouping similar threat agents based on attributes of security
APA, Harvard, Vancouver, ISO, and other styles
29

Viju, G. K., and Khalid Ahmed Ibrahim. "Deployment of Agent-Based Intrusion Detection for Wireless LAN." FES Journal of Engineering Sciences 6, no. 1 (2012): 12. http://dx.doi.org/10.52981/fjes.v6i1.24.

Full text
Abstract:
One of the difficult duties in chemical industrial units is the determination of the level of liquid for real – time monitoring. Determination of this parameter is useful in process control loop. Hence present study is devoted for this purpose by employing microbend based optical fiber sensor. In this work, in order to continuously monitor liquid level in petroleum and chemical industries, an optical fiber sensor based on microbend effect was designed and implemented. The system is consist of a sensor that is composed of a microbend modulator, sensing fiber, emitting / detecting devices, in ad
APA, Harvard, Vancouver, ISO, and other styles
30

Liang, Chao, Bharanidharan Shanmugam, Sami Azam, et al. "Intrusion Detection System for the Internet of Things Based on Blockchain and Multi-Agent Systems." Electronics 9, no. 7 (2020): 1120. http://dx.doi.org/10.3390/electronics9071120.

Full text
Abstract:
With the popularity of Internet of Things (IoT) technology, the security of the IoT network has become an important issue. Traditional intrusion detection systems have their limitations when applied to the IoT network due to resource constraints and the complexity. This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. The system consists of the following modules: data collection, data management, analysis, and response. The National security
APA, Harvard, Vancouver, ISO, and other styles
31

Javidi, Mohammad Masoud. "Network Attacks Detection by Hierarchical Neural Network." Computer Engineering and Applications Journal 4, no. 2 (2015): 119–32. http://dx.doi.org/10.18495/comengapp.v4i2.108.

Full text
Abstract:
Intrusion detection is an emerging area of research in the computer security and net-works with the growing usage of internet in everyday life. Most intrusion detection systems (IDSs) mostly use a single classifier algorithm to classify the network traffic data as normal behavior or anomalous. However, these single classifier systems fail to provide the best possible attack detection rate with low false alarm rate. In this paper,we propose to use a hybrid intelligent approach using a combination of classifiers in order to make the decision intelligently, so that the overall performance of the
APA, Harvard, Vancouver, ISO, and other styles
32

Sandosh, S., V. Govindasamy, and G. Akila. "Enhanced intrusion detection system via agent clustering and classification based on outlier detection." Peer-to-Peer Networking and Applications 13, no. 3 (2020): 1038–45. http://dx.doi.org/10.1007/s12083-019-00822-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Wang, Yue, Ran Tao, and Hao Zhang. "Research on distributed intrusion detection system based on multi-living agent." Science China Information Sciences 53, no. 5 (2010): 1067–77. http://dx.doi.org/10.1007/s11432-010-0086-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Gondal, Farzana Kausar. "Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review." Innovative Computing Review 1, no. 2 (2021): 85–102. http://dx.doi.org/10.32350/icr.0102.05.

Full text
Abstract:
An Intrusion Detection System (IDS) identifies the attacks by analysing the events, considered undesirable from a security perspective, in systems and networks. It is necessary for organizations to install IDS for the protection of sensitive data due to an increase in the number of incidents related to network security. It is difficult to detect intrusions from a segment that is outside a network as well as an intrusion that originated from inside a distributed network. It should be the responsibility of IDS to analyse a huge amount of data without overloading the networks and monitoring syste
APA, Harvard, Vancouver, ISO, and other styles
35

Enyindah, P., and Uzochukwu C. Onwuachu. "An Intrusion Detection System Application for an Organisation." Circulation in Computer Science 2, no. 3 (2017): 23–28. http://dx.doi.org/10.22632/ccs-2017-251-87.

Full text
Abstract:
This paper is aimed at developing an Intrusion Detection System (IDS) that will guarantee the integrity of data housed in databases and connected through a network to other computers. There is need to protect clients’ and organization’s sensitive information as well as gain the benefits of Information Technology without compromising reliability of information. The objective of this software is to detect and track down details of intrusion attempt by unauthorized users such as cases of Internet Fraud. The Structured System Analysis and Development Methodology (SSADM) is adopted to developing th
APA, Harvard, Vancouver, ISO, and other styles
36

Amrita, Amrita, Arun .., and Aditi Sharma. "A Hybrid Intrusion Detection Approach for Cyber Attacks." Journal of Cybersecurity and Information Management 8, no. 2 (2024): 08–18. http://dx.doi.org/10.54216/jcim.130201.

Full text
Abstract:
The field of cybersecurity constantly evolves as attackers develop new methods and technologies. Defending against cyberattacks involves a combination of robust security measures, regular updates, user education, and the use of advanced technologies, such as intrusion detection systems and artificial intelligence, to find out the threats in real-time. IDS are designed to identify and address any unauthorized actions or potential security threats within a computer network or system. A hybrid intrusion detection system (IDS) combines many detection techniques and strategies from different IDS ty
APA, Harvard, Vancouver, ISO, and other styles
37

Battini Sujatha, Et al. "An Efficient Fuzzy Based Multi Level Clustering Model Using Artificial Bee Colony For Intrusion Detection." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11 (2023): 264–73. http://dx.doi.org/10.17762/ijritcc.v11i11.9390.

Full text
Abstract:
Network security is becoming increasingly important as computer technology advances. One of the most important components in maintaining a secure network is an Intrusion Detection System (IDS). An IDS is a collection of tools used to detect and report network anomalies. Threats to computer networks are increasing at an alarming rate. As a result, it is critical to create and maintain a safe computing environment. For network security, researchers employ a range of technologies, including anomaly-based intrusion detection systems (AIDS). These anomaly-based detections face a major challenge in
APA, Harvard, Vancouver, ISO, and other styles
38

Seyedeh, Yasaman Rashida. "HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NETWORK." International Journal of Network Security & Its Applications (IJNSA) 5, no. 3 (2013): 45–54. https://doi.org/10.5281/zenodo.4267213.

Full text
Abstract:
In order to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. Therefore, it is necessary that this security concern must be articulate right from the beginning of the network design and deployment. The intrusion detection technology is the process of identifying network activity that can lead to a compromise of security policy. Lot of work has been done in detection of intruders. But the solutions are not satisfactory. In this paper, w
APA, Harvard, Vancouver, ISO, and other styles
39

Lokbani, Ahmed Chaouki, Ahmed Lehireche, Reda Mohamed Hamou, and Mohamed Amine Boudia. "An Approach based on Social Bees for an Intrusion Detection System by Scenario." International Journal of Organizational and Collective Intelligence 5, no. 3 (2015): 44–67. http://dx.doi.org/10.4018/ijoci.2015070104.

Full text
Abstract:
The aim of the authors' work is to model the intrusion detection system by scenario with a bio-inspired method in this case the system of protection of social bees. The natural pattern of social bees produces security efficiency by its three filters. In this paper, the authors focus on scenario approach they chose as a strategy to intrusion odor recognition of bees. They propose a new philosophy based on limited responsibility for each agent. This proposition aims to better exploit the performance of their hardware, and to use intelligently a kddcup'99 corpus.
APA, Harvard, Vancouver, ISO, and other styles
40

Alazab, Ammar, Ansam Khraisat, Sarabjot Singh, Savitri Bevinakoppa, and Osama A. Mahdi. "Routing Attacks Detection in 6LoWPAN-Based Internet of Things." Electronics 12, no. 6 (2023): 1320. http://dx.doi.org/10.3390/electronics12061320.

Full text
Abstract:
The Internet of Things (IoT) has become increasingly popular, and opened new possibilities for applications in various domains. However, the IoT also poses security challenges due to the limited resources of the devices and its dynamic network topology. Routing attacks on 6LoWPAN-based IoT devices can be particularly challenging to detect because of its unique characteristics of the network. In recent years, several techniques have been proposed for detecting routing attacks, including anomaly detection. These techniques leverage different features of network traffic to identify and classify r
APA, Harvard, Vancouver, ISO, and other styles
41

Almania, Moaad, Anazida Zainal, Fuad A. Ghaleb, Ahmad Alnawasrah, and Mahmoud Al Qerom. "Adaptive Intrusion Detection System with Ensemble Classifiers for Handling Imbalanced Datasets and Dynamic Network Traffic." Journal of Robotics and Control (JRC) 6, no. 1 (2025): 114–23. https://doi.org/10.18196/jrc.v6i1.23648.

Full text
Abstract:
Intrusion Detection Systems (IDS) are crucial for network security, but their effectiveness often diminishes in dynamic environments due to outdated models and imbalanced datasets. This paper presents a novel Adaptive Intrusion Detection System (AIDS) that addresses these challenges by incorporating ensemble classifiers and dynamic retraining. The AIDS model integrates K-Nearest Neighbors (KNN), Fuzzy c-means clustering, and weight mapping to improve detection accuracy and adaptability to evolving network traffic. The system dynamically updates its reference model based on the severity of chan
APA, Harvard, Vancouver, ISO, and other styles
42

Saxena, Arun, and A. K. Sharma. "An Agent based Distributed Security System for Intrusion Detection in Computer Networks." International Journal of Computer Applications 12, no. 3 (2010): 18–27. http://dx.doi.org/10.5120/1659-2234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Singh, Namita, Siddharth Krishan, and Uday Kumar Singh. "An Enhanced Multi-Agent based Network Intrusion Detection System using Shadow Log." International Journal of Computer Applications 100, no. 9 (2014): 1–5. http://dx.doi.org/10.5120/17550-8146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Zhai, Shuang-can, Chen-jun Hu, and Wei-ming Zhang. "Multi-Agent Distributed Intrusion Detection System Model Based on BP Neural Network." International Journal of Security and Its Applications 8, no. 2 (2014): 183–92. http://dx.doi.org/10.14257/ijsia.2014.8.2.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Eesa, Adel S., Adnan M. Abdulazeez, and Zeynep Orman. "A DIDS Based on The Combination of Cuttlefish Algorithm and Decision Tree." Science Journal of University of Zakho 5, no. 4 (2017): 313. http://dx.doi.org/10.25271/2017.5.4.382.

Full text
Abstract:
Different Distributed Intrusion Detection Systems (DIDS) based on mobile agents have been proposed in recent years to protect computer systems from intruders. Since intrusion detection systems deal with a large amount of data, keeping the best quality of features is an important task in these systems. In this paper, a novel DIDS based on the combination of Cuttlefish Optimization Algorithm (CFA) and Decision Tree (DT) is proposed. The proposed system uses an agent called Rule and Feature Generator Agent (RFGA) to generate a subset of features with corresponding rules. RFGA agent uses CFA to se
APA, Harvard, Vancouver, ISO, and other styles
46

Karraz, George. "Develop an Intelligent Anomaly Intrusion Detection System in Computer Networks based on Resilient Back-propagation Neural Network." Damascus University Journal for Basic Sciences, no. 10566-196 (April 29, 2024): 1–18. https://doi.org/10.5281/zenodo.11087938.

Full text
Abstract:
Various anomaly attacks and disruptions to information networks are considered serious problems that affect the protection of information exchanged between these networks and affect the maintenance of reliability and confidentiality of information exchange. In the past decade, researchers around the world have faced many challenges and need to propose a set of systems with flexible architectures to accurately and automatically detect anomaly intrusion attacks to address their complexity. Related research has proposed many full-scale solutions based on machine
APA, Harvard, Vancouver, ISO, and other styles
47

Al-Shourbaji, Ibrahim, and Samaher Al-Janabi. "Intrusion Detection and Prevention Systems in Wireless Networks." Kurdistan Journal of Applied Research 2, no. 3 (2017): 267–72. http://dx.doi.org/10.24017/science.2017.3.48.

Full text
Abstract:
In society today, public and personal communication are often carried out through wireless technology. These technologies can be vulnerable to various types of attacks. Attackers can access the signal to listen or to cause more damage on the wireless networks. Intrusion Detection and Prevention System (IDPS) technology can be used to monitor and analyze the signal for any infiltration to prevent interception or other malicious intrusion. An overview description of IDPSs and their core functions, the primary types of intrusion detection mechanisms, and the limitations of IDPSs are discussed. Th
APA, Harvard, Vancouver, ISO, and other styles
48

Franklin, Eichie, and Bernardi Pranggono. "Anomaly-Based Intrusion Detection System for the Internet of Medical Things." IJID (International Journal on Informatics for Development) 12, no. 2 (2024): 374–85. https://doi.org/10.14421/ijid.2023.4308.

Full text
Abstract:
The use of the Internet of Things (IoT) in the health sector, known as the Internet of Medical Things (IoMT), allows for personalized and convenient (e)-health services for patients. However, there are concerns about security and privacy as unethical hackers can compromise these network systems with malware. We proposed using hyperparameter-optimized Machine and Deep Learning models to address these concerns to build more robust security solutions. We used a representative Anomaly Intrusion Detection System (AIDS) dataset to train six state-of-the-art Machine Learning (ML) and Deep Learning (D
APA, Harvard, Vancouver, ISO, and other styles
49

Dwivedi, Abhijit, Y. K. Rana Y.K.Rana, and B. P. Patel B.P.Patel. "A Real Time Host and Network Mobile Agent based Intrusion Detection System (HNMAIDS)." International Journal of Computer Applications 113, no. 12 (2015): 33–40. http://dx.doi.org/10.5120/19881-1895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Kumar Saxena, Aumreesh, Sitesh Sinha, and Piyush Shukla. "Performance Analysis of Classification Techniques by using Multi Agent Based Intrusion Detection System." International Journal of Computer Network and Information Security 10, no. 3 (2018): 17–24. http://dx.doi.org/10.5815/ijcnis.2018.03.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!