Since Intrusion Detection System (IDS) has become necessary security tool for detecting attacks on computer network and resources, it is therefore essential to improve on previous designs. In past, many mobile agent-based IDSs have been designed, but there still exists some drawbacks. Some of these drawbacks are low detection efficiency, high false alarm rate and agent security. A multi-level and secured IDS architecture that is based on mobile agent is presented on this work to correct these drawbacks. Implementing the new design using JAVA shows a better performance over previous designs
Abstract. Network Attack Resistant is a highlighted topic of network security research in recent yea...
In today‟s modern era of internet and intranet where distributed networking is spreading out its eff...
Abstract: Mobile Ad Hoc Networks are a group of wireless computers, forming a communication network,...
Intrusion Detection Systems (IDS) is defined as a component that analyses system and user op-eration...
This paper is a survey of the work, done for making an IDS fault tolerant.Architecture of IDS that u...
This paper presents a distributed intrusion detection system (IDS), based on mobile agents, that det...
The majority of the Distributed Intrusion Detection systems lack measures for providing security and...
The majority of the Distributed Intrusion Detection systems lack measures for providing security and...
An Intrusion Detection System (IDS) can monitor different events that may occur in a determined netw...
Abstract — the internet systems are attacked by many intruders and the information in the network is...
Abstract- The Internet and computer networks are exposed to an increasing number of security threats...
As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has ...
The Internet and computer networks are exposed to an increasing number of security threats. With new...
Abstract—The growing concern about information security in computer networks is responsible for cons...
The proliferation of wireless communication and mobile computing is driving the emergence of Mobile ...
Abstract. Network Attack Resistant is a highlighted topic of network security research in recent yea...
In today‟s modern era of internet and intranet where distributed networking is spreading out its eff...
Abstract: Mobile Ad Hoc Networks are a group of wireless computers, forming a communication network,...
Intrusion Detection Systems (IDS) is defined as a component that analyses system and user op-eration...
This paper is a survey of the work, done for making an IDS fault tolerant.Architecture of IDS that u...
This paper presents a distributed intrusion detection system (IDS), based on mobile agents, that det...
The majority of the Distributed Intrusion Detection systems lack measures for providing security and...
The majority of the Distributed Intrusion Detection systems lack measures for providing security and...
An Intrusion Detection System (IDS) can monitor different events that may occur in a determined netw...
Abstract — the internet systems are attacked by many intruders and the information in the network is...
Abstract- The Internet and computer networks are exposed to an increasing number of security threats...
As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has ...
The Internet and computer networks are exposed to an increasing number of security threats. With new...
Abstract—The growing concern about information security in computer networks is responsible for cons...
The proliferation of wireless communication and mobile computing is driving the emergence of Mobile ...
Abstract. Network Attack Resistant is a highlighted topic of network security research in recent yea...
In today‟s modern era of internet and intranet where distributed networking is spreading out its eff...
Abstract: Mobile Ad Hoc Networks are a group of wireless computers, forming a communication network,...