2008
DOI: 10.1007/978-3-540-92137-0_48
|View full text |Cite
|
Sign up to set email alerts
|

An Immune Multi-agent System for Network Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…Antigens: they are considered in different approaches [7][11] as bit strings extracted from ippackets, including ip address, port number, protocol type. Set U={0,1}L (L>0), and Ag ⊂ U, and the set U can be divided into self and notself.…”
Section: Immune Components Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Antigens: they are considered in different approaches [7][11] as bit strings extracted from ippackets, including ip address, port number, protocol type. Set U={0,1}L (L>0), and Ag ⊂ U, and the set U can be divided into self and notself.…”
Section: Immune Components Descriptionmentioning
confidence: 99%
“…However, with the networks widening they generate much false alarm, and became less and less reliable to new attack's forms. To overcome difficulties met by these models, new research works are interested in multi-agents systems and immunology principles such as (MAAIS [19], NIDIMA [14], DAMIDAIS [11], IMASNID [7], etc). These systems succeed in decreasing the false alarm rate thanks to the processes employed; namely communication process between the agents and the distinction process between self and not-self.…”
Section: Introductionmentioning
confidence: 99%
“…Thus the objective now is to make the intrusion detection systems more intelligent. Some proposed means of achieving such intelligence include use of neural networks, rule-based networks, genetic algorithms, human-like immunology systems [5] and Markov chains.…”
Section: Introductionmentioning
confidence: 99%
“…For example Balasubramaniyam et al [1], have used a hierarchical structure for intrusion detection. There is also immune-based multi-agent intrusion detection system by Wang et al [5]. Ontology based multiagent intrusion detection systems by Isaza et al [6].…”
Section: Introductionmentioning
confidence: 99%