2013 RoEduNet International Conference 12th Edition: Networking in Education and Research 2013
DOI: 10.1109/roedunet.2013.6714184
|View full text |Cite
|
Sign up to set email alerts
|

An agent-based approach for building an intrusion detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…The first one represents the algorithms related to the mining parts (MiningAlgorithm) (e.g. Fowler & Hammell (2015), Ioniţȃ & Ioniţȃ (2013)). These algorithms were classified according to their objective: Extraction (i.e.…”
Section: Cq4 -Which Are the Approaches (Model Architecture Technique And So On) Used In Agent Mining?mentioning
confidence: 99%
See 1 more Smart Citation
“…The first one represents the algorithms related to the mining parts (MiningAlgorithm) (e.g. Fowler & Hammell (2015), Ioniţȃ & Ioniţȃ (2013)). These algorithms were classified according to their objective: Extraction (i.e.…”
Section: Cq4 -Which Are the Approaches (Model Architecture Technique And So On) Used In Agent Mining?mentioning
confidence: 99%
“…For example, in Gorodetsky (2013) a multi-agent architecture is proposed for anomaly detection, including two agents: Agent of network traffic-based Alert (NTAagent) and Alert Correlation agent (AC-agent). Another example of MultiAgentSystem is in Ioniţȃ & Ioniţȃ (2013) where several agents contribute to the DM process (IDS Data Gathering Agent, Classification Agent, Decision/Action Agent, Alarm Generation Agent, Configuration Agent). The interaction method can be specified according to defined communication (AgentCommunication), coordination (AgentCoordination) and/or organization (AgentOrganisation) structures (see Figure 6).…”
mentioning
confidence: 99%
“…The results obtained by testing a prototype of the proposed approach showed that their system is able to manage and mitigate some common vulnerability issues of power grid automation systems [44]. Ionita and Ionita (2013) proposed a multi intelligent agent based approach for network intrusion detection using data mining [47].…”
Section: Intelligent Agent Applicationsmentioning
confidence: 99%