2012
DOI: 10.1007/978-3-642-31217-5_19
|View full text |Cite
|
Sign up to set email alerts
|

Multi-agent Based Approach of Botnet Detection in Computer Systems

Abstract: Abstract.A new approach for the botnet detection based on multi-agent system is proposed. For increasing of the efficiency of botnet detection multi-agent systems were involve that allowed to make antivirus diagnosis via agents' communication within corporate network. The structure and main principles of antiviral agents' functioning within multi-agent system are developed. The principles of communication between the agent's units before and after attack on the computer system were developed. A new technique f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 4 publications
0
10
0
Order By: Relevance
“…The analysis process can be done by an individual agent or collectively by a team of agents. The location of the analyzer agent can be either centralized at a specific location in the network, such as the security centre [19], [20], [55], or decentralized at several points on the network [45], [56], [57]. The third component is the management and coordination component that used to configure, organize, and maintain the multi-agent IDS architecture.…”
Section: ) the Computational Components Classificationmentioning
confidence: 99%
See 3 more Smart Citations
“…The analysis process can be done by an individual agent or collectively by a team of agents. The location of the analyzer agent can be either centralized at a specific location in the network, such as the security centre [19], [20], [55], or decentralized at several points on the network [45], [56], [57]. The third component is the management and coordination component that used to configure, organize, and maintain the multi-agent IDS architecture.…”
Section: ) the Computational Components Classificationmentioning
confidence: 99%
“…However, there are a few studies that also included tasks such as data collection, aggregation, synchronization, and preparation for analysis by analyzer agent(s). These tasks, in some cases, were embedded in sensor agents [58], [64], while in other cases, they were added to the tasks of analysis agents [57], [65]. As apart of data collection and synchronization, sensor and analysis agents also encompassed methods to generate and derive new features, from the accumulated data, these features assumed to be effective in classifying the attack incidents [4], [5], [54].…”
Section: ) Data Collection and Synchronizationmentioning
confidence: 99%
See 2 more Smart Citations
“…Probably, the most efficient way to combat an automous botnet is an approach that also uses some kind of intelligent agents. There are some MAS-based detection approaches as those presented by Pomorova et al [24] and Savenko et al [25]. In this way, we could create a MAS-based approach to show a possible combat method against intelligent botnets.…”
Section: Combating Intelligent Botsmentioning
confidence: 99%