Intrusion Detection Systems (IDS) is defined as a component that analyses system and user op-erations in computer and network systems in search of activities considered undesirable from se-curity perspectives. Applying mobile agent (MA) to intrusion detection design is a recent devel-opment and it is aimed at effective intrusion detection in distributed environment. From the litera-ture, it is clear that most MA-based IDS that are available are not quite effective because their time to detection is high and detect limited intrusions.This paper proposes a way of classifying a typical IDS and then strategically reviews the existing mobile agent-based IDSs focusing on each of the categories of the classification, for example architecture, mode...
The first generation of Mobile Agents based Intrusion Detection System just had two components namel...
This paper describes the implementation of a distributed agent architecture for intrusion detection ...
This paper describes the implementation of a distributed agent architecture for intrusion detection ...
This paper presents a distributed intrusion detection system (IDS), based on mobile agents, that det...
Abstract — The one of the most serious threats to computer security is the unauthorized intrusion in...
As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has ...
This paper is a survey of the work, done for making an IDS fault tolerant.Architecture of IDS that u...
International audienceDue to the rapid growth of the network application, new kinds of network attac...
<p><em>As the challenges and problems surround intrusion rises rapidly, the intrusion detection syst...
Abstract- The Internet and computer networks are exposed to an increasing number of security threats...
Abstract:- DIDMA (Distributed Intrusion Detection using Mobile Agents) is a novel architecture in th...
Abstract: Mobile Ad Hoc Networks are a group of wireless computers, forming a communication network,...
Due to the rapid growth of the network application, new kinds of network attacks are emerging endles...
Due to the rapid growth of the network application, new kinds of network attacks are emerging endles...
The evolution of wireless network technologies and the recent advances in mobile computing hardware ...
The first generation of Mobile Agents based Intrusion Detection System just had two components namel...
This paper describes the implementation of a distributed agent architecture for intrusion detection ...
This paper describes the implementation of a distributed agent architecture for intrusion detection ...
This paper presents a distributed intrusion detection system (IDS), based on mobile agents, that det...
Abstract — The one of the most serious threats to computer security is the unauthorized intrusion in...
As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has ...
This paper is a survey of the work, done for making an IDS fault tolerant.Architecture of IDS that u...
International audienceDue to the rapid growth of the network application, new kinds of network attac...
<p><em>As the challenges and problems surround intrusion rises rapidly, the intrusion detection syst...
Abstract- The Internet and computer networks are exposed to an increasing number of security threats...
Abstract:- DIDMA (Distributed Intrusion Detection using Mobile Agents) is a novel architecture in th...
Abstract: Mobile Ad Hoc Networks are a group of wireless computers, forming a communication network,...
Due to the rapid growth of the network application, new kinds of network attacks are emerging endles...
Due to the rapid growth of the network application, new kinds of network attacks are emerging endles...
The evolution of wireless network technologies and the recent advances in mobile computing hardware ...
The first generation of Mobile Agents based Intrusion Detection System just had two components namel...
This paper describes the implementation of a distributed agent architecture for intrusion detection ...
This paper describes the implementation of a distributed agent architecture for intrusion detection ...