2006 International Conference on Computational Inteligence for Modelling Control and Automation and International Conference On 2006
DOI: 10.1109/cimca.2006.56
|View full text |Cite
|
Sign up to set email alerts
|

AWide Area Log Analyzing System Based on Mobile Agents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…At very low densities, network disconnection chances were high as also the detection probability. An agent based log analyzing system integrating P2P network concepts and mobile agents to realize detection and protection from damage caused by worms in early stages was proposed by Katoh, et al, [16]. Experimental results revealed the proposed system collected useful information from a wide network area, and ensured flexible and on-demand network traffic logs analysis to detect hostile network attacks.…”
Section: Related Workmentioning
confidence: 99%
“…At very low densities, network disconnection chances were high as also the detection probability. An agent based log analyzing system integrating P2P network concepts and mobile agents to realize detection and protection from damage caused by worms in early stages was proposed by Katoh, et al, [16]. Experimental results revealed the proposed system collected useful information from a wide network area, and ensured flexible and on-demand network traffic logs analysis to detect hostile network attacks.…”
Section: Related Workmentioning
confidence: 99%