2009 International Symposium on Collaborative Technologies and Systems 2009
DOI: 10.1109/cts.2009.5067484
|View full text |Cite
|
Sign up to set email alerts
|

Laocoonte: An agent based Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0
3

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 11 publications
0
2
0
3
Order By: Relevance
“…Laocoonte [3], a novel mobile based distributed intrusion detection system [5], LAMAIDS [6], mobile agents for network intrusion resistance [8], design of a multi-agent based intelligent intrusion detection system [9], IDSUDA [12], MSABIDS [13], agent based network intrusion detection system [14], APHIDS [15], an adaptive intrusion detection and defense system based on mobile agents [16] and intelligent and mobile agent for intrusion detection system [18] are examples of systems which make use of mobile agents to perform distributed intrusion detection. However there are many disadvantages [20] of using agents and the mobile agent based systems have failed to address them.…”
Section: Related Workmentioning
confidence: 99%
“…Laocoonte [3], a novel mobile based distributed intrusion detection system [5], LAMAIDS [6], mobile agents for network intrusion resistance [8], design of a multi-agent based intelligent intrusion detection system [9], IDSUDA [12], MSABIDS [13], agent based network intrusion detection system [14], APHIDS [15], an adaptive intrusion detection and defense system based on mobile agents [16] and intelligent and mobile agent for intrusion detection system [18] are examples of systems which make use of mobile agents to perform distributed intrusion detection. However there are many disadvantages [20] of using agents and the mobile agent based systems have failed to address them.…”
Section: Related Workmentioning
confidence: 99%
“…Securing information on data networks and the networks themselves have become very difficult tasks considering the diverse types and number of intrusions being recorded daily. There is a lot of ongoing research work in the area of data network security management to develop techniques to combat intruders because of the financial losses incurred by enterprises due to activities of intruders (Paez & Torres, 2009;Jing-Wen et al, 2009;Kui, 2009;Lixia et al, 2009;Momenzadeh et al, 2009;Ihn-Han & Olariu, 2009;Cannady, 2009;Changxin & Ke, 2009;Wei et al, 2009). This effort should seriously include securing networks also, and that is exactly what this IDS proves to do.…”
Section: Introductionmentioning
confidence: 99%
“…Estos problemas se pueden solucionar a través de la implementación de certificados digitales [8], pero su integración tradicional excluye en escenario planteado de una solución totalmente descentralizada. Una solución innovadora de sistema de detección de intrusos es presentada en [44], orientado a la seguridad interna de los dispositivos y de la red, a través de una solución de huella digital aplicada por software.…”
Section: Seguridadunclassified
“…Como presentado anteriormente, algunos problemas como intrusión, repudio, denegación de servicio y divulgación de información, se pueden presentar, ya que la solución de Blockchain no fue implementada directamente a estos dispositivos debido a restricción de sus recursos. La solución desarrollada fue basada en un sistema de detección de intrusiones de agentes autónomos [44] y utiliza una técnica para verificar la autenticidad de los componentes no contemplados por el Blockchain, es decir, los dispositivos IoT y su comunicación con los Management Hubs.…”
Section: Autenticidad Del Iotunclassified
See 1 more Smart Citation