13.07.2015 Views

Distributed Intrusion Detection System Using P2P Agent Mining ...

Distributed Intrusion Detection System Using P2P Agent Mining ...

Distributed Intrusion Detection System Using P2P Agent Mining ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Vol 5. No. 2, March, 2012 ISSN 2006-1781African Journal of Computing & ICT© 2012 Afr J Comp & ICT – All Rights Reservedwww.ajocict.netLevel 3Level 2Level 1HIDS<strong>Agent</strong>NIDSTrustAssurance<strong>Agent</strong>Data Analysis<strong>Agent</strong>Data <strong>Mining</strong>HIDSMobility,Cooperation&CommunicationCooperation &CommunicationHIDSSecurity<strong>Agent</strong>NIDSData Sharing<strong>Agent</strong>Data <strong>Mining</strong><strong>Agent</strong>Fig. 4. Schematic Diagram of the <strong>System</strong> CompositionREFERENCES[1] A. Abraham , R. Jain, J. Thomas and S.Y. Han , “D-SCIDS: <strong>Distributed</strong> soft computing intrusion detectionsystem,” Journal of Network and Computer Applications,Vol. 30, 2007, pp 81–98.[2] M. Almeida and B. Mutina (2011) Defacement Statistics2002-2010. http://www.zone-h.org. Accessed May 5,2011.[3] S. Androutsellis-Theotokis and D. Spinellis, “A Survey ofPeer-to-Peer Content Distribution Technologies,” ACMComputing Surveys, vol. 36, No. 4, 2004, 335–371.[4] J. Barrus and N.C. Rowe, “A distributed autonomous-agentnetwork-intrusion detection and response system,” InCommand and Control Research and TechnologySymposium, pages 577–586, Monterey, CA, June 1998..[5] I. Brahmi, S.B.Yahia, and P. Poncelet “MAD-IDS: Novel<strong>Intrusion</strong> <strong>Detection</strong> <strong>System</strong> using Mobile <strong>Agent</strong>s and Data<strong>Mining</strong> approaches,”2010.[6] S.T. Brugger, “Data <strong>Mining</strong> Methods for Network<strong>Intrusion</strong> <strong>Detection</strong>,” Unpublished Ph. D. ThesisUniversity of California, Davis, 2004 [7] V.Chatzigiannakis., G. Androulidakis, M. Grammatikou andB. Maglaris, “A distributed intrusion detection prototypeusing security agents,” In 11th Workshop of theHPOVUA, June 2004.[8] J.C. Da Silva, C. Giannella, R. Bhargava, H. Karguptaand M. Klusch, “<strong>Distributed</strong> Data <strong>Mining</strong> and <strong>Agent</strong>s,”9th international workshop on cooperative informationagents (CIA 2004)[9] M. Eid, H. Artail, A. Kayssi and A. Chehab, "Trends inmobile agent application. Journal of Research and Practicein Information Technology,37(4), 2005.[10] N. Einwechter (2001) "An Introduction to <strong>Distributed</strong><strong>Intrusion</strong> <strong>Detection</strong> <strong>System</strong>s,”http://online.securityfocus.com/infocus/1532. AccessedMay 6, 2011.[11] V. Engen, “Machine learning for network based <strong>Intrusion</strong>detection: An investigation into discrepancies in findingswith the kdd cup ’99 data set and multi-objective evolutionof neural network classifier ensembles for imbalanceddata. Unpublished Ph.D. Thesis of BournemouthUniversity, 2010.[12] D. Frincke, D. Tobin, J. Mcconnell, J. Marconi and D.Polla, “A framework for cooperative intrusion detection”In 21st National Information <strong>System</strong>s SecurityConference, pages 361– 373, October 1998.[13] C. Fung, “Collaborative <strong>Intrusion</strong> <strong>Detection</strong> Networksand Insider Attacks,” Journal of Wireless MobileNetworks, Ubiquitous Computing, and Dep endableApplications, volume: 2, number: 1, 2011, pp. 63-74[14] R. Gopalakrishna andE.H. Spafford, “A framework fordistributed intrusion detection using interest drivencooperating agents,” 2001.9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!