2006 2nd International Conference on Information &Amp; Communication Technologies
DOI: 10.1109/ictta.2006.1684990
|View full text |Cite
|
Sign up to set email alerts
|

A Proposed Multi-Agent System for Intrusion Detection System in a Complex Network

Abstract: The openness of business toward telecommunication network in general and internet in particular is performed at the prize of high security risks. Every professional knows that the only way to secure completely a private network is to make it unreachable. However, even if this solution was undertaken for many years, nowadays it is not possible to close private network especially for business purpose. Thus security management becomes an important issue that must be considered carefully.This research concentrates… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…Hamami et al [1] have presented the MAS for intrusion detection in complex networks (networks with many users, machines, and connections). The researchers' perspective of proposed IDS present that MAS is an appropriate solution for intrusion detection considering its various properties like distribution, cooperation etc.…”
Section: Background Workmentioning
confidence: 99%
“…Hamami et al [1] have presented the MAS for intrusion detection in complex networks (networks with many users, machines, and connections). The researchers' perspective of proposed IDS present that MAS is an appropriate solution for intrusion detection considering its various properties like distribution, cooperation etc.…”
Section: Background Workmentioning
confidence: 99%
“…Also, it may learn or use knowledge to achieve these goals. A hierarchal architecture of the SA-NSM is proposed and studied by [5,18] based on a multi-agent system. It is viewed as a collection of autonomous and intelligent agents located in specific network entities named NSM hosts.…”
Section: Static Agents Nsmmentioning
confidence: 99%
“…But, in practice, it is not possible to have a completely secure network. So, applying security management is a two-fold activity: 1-The security architecture is to be deployed to protect networks by detecting attack; and 2-when attacks are detected the security architecture deals with these attacks in real time by taking security measures [5] . An efficient management system is needed to make use of different security mechanisms in large networks.…”
Section: Introductionmentioning
confidence: 99%