Multi-agent systems for protecting critical infrastructures: A survey

ZA Baig - Journal of Network and Computer Applications, 2012 - Elsevier
Multi-agent systems have emerged as a very significant platform in provisioning distributed
and collaborative services to critical applications. Such applications require ubiquitous …

[PDF][PDF] Cooperative machine learning for intrusion detection system

R Bhosale, S Mahajan, P Kulkarni - International Journal of Scientific and …, 2014 - Citeseer
Firewall is employed for defense however they are doing not offer full protection. This ends
up in implementation of intrusion detection and interference system. Intrusion detection …

Design of cooperative deployment in distributed Honeynet system

H Wang, Q Chen - The 2010 14th International Conference on …, 2010 - ieeexplore.ieee.org
Honeypot is a type of information system, purposely built to attract and deceive computer
intruders and malicious programs. For making it easier to deploy and more difficult to discern …

A multi-agent-based approach to improve intrusion detection systems false alarm ratio by using honeypot

B Khosravifar, M Gomrokchi… - … Conference on Advanced …, 2009 - ieeexplore.ieee.org
In this paper we propose a new architecture, which is composed of distributed cooperative
agents to reduce the false alarm ratio of the intrusion detection systems (IDS) in a twofold …

Idsai: A distributed system for intrusion detection based on intelligent agents

MA Sanz-Bobi, M Castro… - 2010 Fifth International …, 2010 - ieeexplore.ieee.org
This paper describes an intelligent system for automatic detection of intrusions in computer
networks. Its architecture is based on a multi-agent system in which several types of agents …

False alarm reduction using adaptive agent-based profiling

S Hacini, Z Guessoum, M Cheikh - International Journal of …, 2013 - igi-global.com
In this paper the authors propose a new efficient anomaly-based intrusion detection
mechanism based on multi-agent systems. New networks are particularly vulnerable to …

Multi-agent systems for dynamic forensic investigation

P Kendrick, AJ Hussain, N Criado - … , ICIC 2016, Lanzhou, China, August 2 …, 2016 - Springer
Abstract In recent years Multi-Agent Systems have proven to be a useful paradigm for areas
where inconsistency and uncertainty are the norm. Network security environments suffer …

An expected-utility based approach to variation aware VLSI optimization under scarce information

U Gupta, N Ranganathan - … of the 2008 international symposium on Low …, 2008 - dl.acm.org
In this research, we propose a novel approach for simultaneous optimization of power,
crosstalk noise and delay via gate sizing, in the presence of scarce information about the …

False Alarm Reduction: A Profiling Mechanism and New Research Directions

S Hacini, Z Guessoum, M Cheikh - Security and Privacy …, 2018 - igi-global.com
Intrusion detection systems (IDSs) are commonly used to detect attacks on computer
networks. These tools analyze incoming and outgoing traffic for suspicious anomalies or …

[图书][B] A Multi-Agent Approach to Advanced Persistent Threat Detection in Networked Systems

P Kendrick - 2018 - search.proquest.com
Advanced cyber threats that are well planned, funded and stealthy are an increasing issue
facing secure networked systems. As our reliance on protected networked systems …