The first generation of Mobile Agents based Intrusion Detection System just had two components namely data collection and single centralized analyzer. The disadvantage of this type of intrusion detection is if connection to the analyzer fails, the entire system will become useless. In this work, we propose novel hybrid model for Mobile Agent based Distributed Intrusion Detection System to overcome the current problem. The proposed model has new features such as robustness, capability of detecting intrusion against the IDS itself and capability of updating itself to detect new pattern of intrusions. In addition, our proposed model is also capable of tackling some of the weaknesses of centralized Intrusion Detection System models
© 2013, IGI Global. Security has become the Achilles\u27 heel of many organizations in today\u27s co...
In recent decade, computer networks have grown in popularity. So, network security measures become h...
Print ISBN : 978-1-4577-0979-1International audienceThe evolution of wireless network technologies a...
This paper presents a distributed intrusion detection system (IDS), based on mobile agents, that det...
The majority of the Distributed Intrusion Detection systems lack measures for providing security and...
Intrusion Detection Systems (IDS) is defined as a component that analyses system and user op-eration...
The majority of the Distributed Intrusion Detection systems lack measures for providing security and...
The majority of the Distributed Intrusion Detection systems lack measures for providing security and...
In order to the rapid growth of the network application, new kinds of network attacks are emerging e...
Abstract:- DIDMA (Distributed Intrusion Detection using Mobile Agents) is a novel architecture in th...
International audienceDue to the rapid growth of the network application, new kinds of network attac...
Abstract — The one of the most serious threats to computer security is the unauthorized intrusion in...
Security has become the Achilles\u27 heel of many organizations in today\u27s computer-dominated soc...
Abstract- The Internet and computer networks are exposed to an increasing number of security threats...
Abstract: Problem statement: In earlier days, each and every individual system has particular IDS to...
© 2013, IGI Global. Security has become the Achilles\u27 heel of many organizations in today\u27s co...
In recent decade, computer networks have grown in popularity. So, network security measures become h...
Print ISBN : 978-1-4577-0979-1International audienceThe evolution of wireless network technologies a...
This paper presents a distributed intrusion detection system (IDS), based on mobile agents, that det...
The majority of the Distributed Intrusion Detection systems lack measures for providing security and...
Intrusion Detection Systems (IDS) is defined as a component that analyses system and user op-eration...
The majority of the Distributed Intrusion Detection systems lack measures for providing security and...
The majority of the Distributed Intrusion Detection systems lack measures for providing security and...
In order to the rapid growth of the network application, new kinds of network attacks are emerging e...
Abstract:- DIDMA (Distributed Intrusion Detection using Mobile Agents) is a novel architecture in th...
International audienceDue to the rapid growth of the network application, new kinds of network attac...
Abstract — The one of the most serious threats to computer security is the unauthorized intrusion in...
Security has become the Achilles\u27 heel of many organizations in today\u27s computer-dominated soc...
Abstract- The Internet and computer networks are exposed to an increasing number of security threats...
Abstract: Problem statement: In earlier days, each and every individual system has particular IDS to...
© 2013, IGI Global. Security has become the Achilles\u27 heel of many organizations in today\u27s co...
In recent decade, computer networks have grown in popularity. So, network security measures become h...
Print ISBN : 978-1-4577-0979-1International audienceThe evolution of wireless network technologies a...