2008
DOI: 10.1016/j.comcom.2007.11.018
|View full text |Cite
|
Sign up to set email alerts
|

Autonomous decision on intrusion detection with trained BDI agents

Abstract: In the context of computer security, the first step to respond to an intrusive incident is the detection of such activity in the monitored system. In recent years, research in intrusion detection has evolved to become a multi-discipline task that involves areas such as data mining, decision analysis, agent-based systems or cost-benefit analysis among others. We propose a multiagent IDS that considers decision analysis techniques in order to configure itself optimally according to the conditions faced. This IDS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 32 publications
0
9
0
Order By: Relevance
“…In terms of the development of CIDN in IoT, there are several research that has been done in the scenario such as COLIDE [15]. Meanwhile, our agent-based modeling of the intrusion detection system was came from Orfila's research [16].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In terms of the development of CIDN in IoT, there are several research that has been done in the scenario such as COLIDE [15]. Meanwhile, our agent-based modeling of the intrusion detection system was came from Orfila's research [16].…”
Section: Related Workmentioning
confidence: 99%
“…Our proposed system idea mainly came from Fung's [17] and Orfila's research [16]. Then we combine and adjust several parameters and scenario so that we can reach our goal.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, being lack of self-learning and self-adapting abilities, they can only prevent those known network intrusions, and can do nothing for those variety intrusions. Recent years, the artificial immune system has the features of dynamic, self-adaptation and diversity [3][4][5][6] that just meet the constraints derived from the characteristics of the grid environment, and mobile agent has many same appealing properties as that of artificial immune system. Negative Selection Algorithm and the concept of computer immunity proposed by Forrest in 1994 [7][8].…”
Section: Introductionmentioning
confidence: 99%
“…Some research have been conducted in measuring and comparing the patch development process of vendors [18,31,23] and numerous studies have examined different approaches for evaluating NIDS effectiveness [33,19,28,29,15]. However, vulnerable time windows caused by delays in the updating process of signature-based NIDS have not been yet explored and quantified as a performance metric.…”
Section: A C C E P T E D Accepted Manuscriptmentioning
confidence: 99%