Abstract:Intrusion Detection Systems (IDS) based on autonomous agents are important security tools to protect distributed networks and they can be considered critical systems. For this reason; we have proposed a security scheme to verify the entities' integrity inside the IDS architecture named Cooperative Itinerant Agent (CIA). The proposal includes software watermarking and fingerprinting techniques. Moreover, in this paper we infer a formula to calculate the time consumed by a CIA to perform entities' verification i… Show more
“…Based on [25], the average time that the Itinerant agent takes to move from one container to another container and back is given by (Equation 1. ): With this equation, the average time that the Itinerant agent takes to move from container to container and back in the implemented system is:…”
An Intrusion Detection System (IDS) can monitor different events that may occur in a determined network or host, and which affect any network security service (confidentiality, integrity, availability
“…Based on [25], the average time that the Itinerant agent takes to move from one container to another container and back is given by (Equation 1. ): With this equation, the average time that the Itinerant agent takes to move from container to container and back in the implemented system is:…”
An Intrusion Detection System (IDS) can monitor different events that may occur in a determined network or host, and which affect any network security service (confidentiality, integrity, availability
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.