2006
DOI: 10.1007/11903697_14
|View full text |Cite
|
Sign up to set email alerts
|

Immune Multi-agent Active Defense Model for Network Intrusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…Distributedness in the discussed systems are implemented through two methods, namely distributing the IDS in various hosts as in Machado et al (2005), Luther et al (2007), Yang et al (2009) and Ahmedi and Maleki (2008) where all the tasks and information are shared by the different systems in the network. The second method involves agents moving through the various hosts in the network collecting and sharing information among themselves as in Liu et al (2006Liu et al ( , 2007, Hu et al (2007), Boukerche et al (2007), Hilker (2008), Zhongmin et al (2007) and Yeom and Park (2005). While in the system by Okamoto and Ishida (2007), all systems in a LAN generate agents and are shared with all other computers.…”
Section: Distributedmentioning
confidence: 97%
See 2 more Smart Citations
“…Distributedness in the discussed systems are implemented through two methods, namely distributing the IDS in various hosts as in Machado et al (2005), Luther et al (2007), Yang et al (2009) and Ahmedi and Maleki (2008) where all the tasks and information are shared by the different systems in the network. The second method involves agents moving through the various hosts in the network collecting and sharing information among themselves as in Liu et al (2006Liu et al ( , 2007, Hu et al (2007), Boukerche et al (2007), Hilker (2008), Zhongmin et al (2007) and Yeom and Park (2005). While in the system by Okamoto and Ishida (2007), all systems in a LAN generate agents and are shared with all other computers.…”
Section: Distributedmentioning
confidence: 97%
“…Agents in the AIS learn to detect self and non-self through negative selection (Harmer et al 2002;Zhang et al 2005;Okamoto and Ishida 2007;Zhongmin et al 2007;Luther et al 2007;Ahmedi and Maleki 2008;Le Boudec and Sarajanovic 2004;Yeom and Park 2005;Byrski and Carvalho 2008), clonal selection (Machado et al 2005;Boukerche et al 2007;Gong et al 2006a,b,c;Liu et al 2006;Hu et al 2007;Yang et al 2009), danger theory (Hilker 2008;Greensmith et al 2008), or artificial immune networks (Watanabe and lshida 2004;Aickelin et al 2004). …”
Section: Learningmentioning
confidence: 98%
See 1 more Smart Citation
“…Set U={0,1}L (L>0), and Ag ⊂ U, and the set U can be divided into self and notself. The self indicates normal network behavior; on the other hand, notself indicates the abnormal network [16].…”
Section: Immune Components Descriptionmentioning
confidence: 99%
“…Another architecture is proposed by Sunjun, the Immune Multi-agent Active Defense Model for Network Intrusion (IMMAD) in 2006 [16]. This model is built for monitoring multilayer of network, by a set of agents that communicate and cooperate at different levels.…”
Section: Related Workmentioning
confidence: 99%