Abstract. This paper proposes a system of agents that make predic-tions over the presence of intrusions. Some of the agents act as predic-tors implementing a given Intrusion Detection model, sniffing out the same traffic. An assessment agent weights the forecasts of such predictor agents, giving a final binary conclusion using a probabilistic model. These weights are continuously adapted according to the previous performance of each predictor agent. Other agent establishes if the prediction from the assessor agent was right or not, sending him back the results. This process is continually repeated and runs without human interaction. The effectiveness of our proposal is measured with the usual method applied in Intrusion Detection domain: Re...
Network Intrusion Detection Systems (NIDS) are designed to differentiate malicious traffic from norm...
This work describes a multiagent system incorporating some artificial intelligence techniques for in...
In this paper we discuss our research in developing gen-eral and systematic methods for intrusion de...
Proceeding of: Multi-agent systems and applications III : 3rd International Central and Eastern Euro...
Recent studies about Intrusion Detection Systems (IDS) performance reveal that the value of an IDS a...
Intrusion detection systems are used for monitoring the network data, analyze them and find the intr...
Chair of Advisory Committee: Dr. Udo W. Pooch A new methodology has been developed for adaptive, aut...
Demand for intrusion detection systems (IDSs) has increased significantly due to the exponential inc...
Abstract--This paper proposes a new methodology for adaptive, automated intrusion response (IR) usin...
Security is one of the major issues in any network and on the Internet. It encapsulates many differe...
Most of the existing commercial Network Intrusion Detection System (NIDS) products are signature-bas...
This paper details an essential component of a multi-agent distributed knowledge network system for ...
Many advanced techniques have been developed recently to help fight against intrusion. Significant p...
[[abstract]]An intrusion detection system (IDS) is a security layer to detect ongoing intrusive acti...
Abstract — Firewall is employed for defense however they are doing not offer full protection. This e...
Network Intrusion Detection Systems (NIDS) are designed to differentiate malicious traffic from norm...
This work describes a multiagent system incorporating some artificial intelligence techniques for in...
In this paper we discuss our research in developing gen-eral and systematic methods for intrusion de...
Proceeding of: Multi-agent systems and applications III : 3rd International Central and Eastern Euro...
Recent studies about Intrusion Detection Systems (IDS) performance reveal that the value of an IDS a...
Intrusion detection systems are used for monitoring the network data, analyze them and find the intr...
Chair of Advisory Committee: Dr. Udo W. Pooch A new methodology has been developed for adaptive, aut...
Demand for intrusion detection systems (IDSs) has increased significantly due to the exponential inc...
Abstract--This paper proposes a new methodology for adaptive, automated intrusion response (IR) usin...
Security is one of the major issues in any network and on the Internet. It encapsulates many differe...
Most of the existing commercial Network Intrusion Detection System (NIDS) products are signature-bas...
This paper details an essential component of a multi-agent distributed knowledge network system for ...
Many advanced techniques have been developed recently to help fight against intrusion. Significant p...
[[abstract]]An intrusion detection system (IDS) is a security layer to detect ongoing intrusive acti...
Abstract — Firewall is employed for defense however they are doing not offer full protection. This e...
Network Intrusion Detection Systems (NIDS) are designed to differentiate malicious traffic from norm...
This work describes a multiagent system incorporating some artificial intelligence techniques for in...
In this paper we discuss our research in developing gen-eral and systematic methods for intrusion de...