D-SCIDS: distributed soft computing intrusion detection system

作者: Ajith Abraham , Ravi Jain , Johnson Thomas , Sang Yong Han , None

DOI: 10.1016/J.JNCA.2005.06.001

关键词:

摘要: … Small, individual agents would roam a distributed system, identify intrusions, and resolve … security-related computer programs by observing the normal sets of system calls executed by …

参考文章(37)
Srinivas Mukkamala, Andrew H. Sung, A. J. Abraham, Intrusion Detection Using Ensemble of Soft Computing and Hard Computing Paradigms Journal of Network and Computer Applications. ,(2005)
Christopher Krügel, Thomas Toth, Applying Mobile Agent Technology to Intrusion Detection ,(2001)
Giovanni Vigna, Richard A. Kemmerer, NetSTAT: a network-based intrusion detection system Journal of Computer Security. ,vol. 7, pp. 37- 71 ,(1999) , 10.3233/JCS-1999-7103
Tom Karygiannis, Peter Mell, Wayne Jansen, Don Marks, Applying Mobile Agents to Intrusion Detection and Response ,(1999)
William W. Cohen, Learning trees and rules with set-valued features national conference on artificial intelligence. pp. 709- 716 ,(1996)
Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo, A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions recent advances in intrusion detection. pp. 49- 65 ,(2000) , 10.1007/3-540-39945-3_4
Stephen E. Smaha, Terrance L. Goan, James Brentano, Daniel M. Teal, Karl N. Levitt, Biswanath Mukherjee, Steven R. Snapp, L. Todd Heberlein, Gihan V. Dias, Tim Grance, Che-Lin Ho, Doug Mansur, DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype Internet besieged. pp. 211- 227 ,(1997)