2005
DOI: 10.1007/11569510_3
|View full text |Cite
|
Sign up to set email alerts
|

APHIDS++: Evolution of A Programmable Hybrid Intrusion Detection System

Abstract: With the rapid growth of the Internet and the ever-increasing security problems associated with its popularity, the need for protection against unwanted intruders has become essential. Antivirus software, intrusion detection systems, spyware and malware detectors are some of the protection mechanisms available to users today. The diversity of these manifold systems suggests the need for a unifying managerial system, such as APHIDS (A Programmable Hybrid Intrusion Detection System), a mobile agent based IDS, wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2007
2007
2011
2011

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…A variety of frameworks and architectures for multiagent modelling and simulation of distributed complex systems have been developed, for example, shared plans theory , joint intentions theory and hybrid approach , while various software multiagent environments have been implemented. The approaches based on belief‐desire‐intention, distributed constraint optimization, distributed partially observable Markov decision problems, and auctions or game‐theoretic are emphasized to provide the optimal interaction of heterogeneous components.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A variety of frameworks and architectures for multiagent modelling and simulation of distributed complex systems have been developed, for example, shared plans theory , joint intentions theory and hybrid approach , while various software multiagent environments have been implemented. The approaches based on belief‐desire‐intention, distributed constraint optimization, distributed partially observable Markov decision problems, and auctions or game‐theoretic are emphasized to provide the optimal interaction of heterogeneous components.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, a lot of prominent works implementing agent‐based approach to network security were published, for example Refs. . All these works show the advantages of using agents for network security in comparison with traditional technologies (centralized and hierarchical) including higher fault tolerance and robustness, flexibility, subversion resistance (cross‐verification, with each agent being checked periodically by several others), minimal overhead (on communication and load of the host system), better adaptability, scalability and dynamic reconfiguration, and possibility of graceful degradation of service.…”
Section: Related Workmentioning
confidence: 99%
“…APHIDS was subsequently upgraded, generating APHIDS++ [52] that introduces a two-level caching scheme:…”
Section: Mobile Agentsmentioning
confidence: 99%