2010
DOI: 10.3745/jips.2010.6.4.481
|View full text |Cite
|
Sign up to set email alerts
|

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques

Abstract: Abstract-The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools is an Intrusion detection system which can be classified based on detection approachs as being signature-based or anomaly-based. Even though intrusion detection systems are well defined, their cooperation with each other to detect attacks needs to be addressed. Consequently, a new architecture that allows them to cooperate in detecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…In addition, more simulation results and scenarios can be constructed while nodes leave and join the networks. It is helpful to develop a more effective SYN flooding mitigation scheme relying on other schemes such as SynDefender (http://www.checkpoint.com/products/rewall-1) to mitigate SYN flooding attacks for large‐scale network security or wireless network security in the future.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, more simulation results and scenarios can be constructed while nodes leave and join the networks. It is helpful to develop a more effective SYN flooding mitigation scheme relying on other schemes such as SynDefender (http://www.checkpoint.com/products/rewall-1) to mitigate SYN flooding attacks for large‐scale network security or wireless network security in the future.…”
Section: Resultsmentioning
confidence: 99%
“…It is helpful to develop a more effective SYN flooding mitigation scheme relying on other schemes such as SynDefender (http://www. checkpoint.com/products/rewall-1) to mitigate SYN flooding attacks for large-scale network security [26] or wireless network security [27][28][29][30][31][32] in the future. A demonstration of the security comm.…”
Section: Resultsmentioning
confidence: 99%
“…FL can meet this requirement by distributing AI/ML models to the local devices and using the computational capability of all clients such as routers for building a strong attack defense mechanism for better detection rate. To improve the scalability of intrusion detection, a line-speed and scalable FL approach is introduced in [85]. Each IoT device runs a binarized NN for packet classification at the line speed of nearby switches in a scalable manner, while preserving privacy of network traces.…”
Section: Fl For Iot Attack Detectionmentioning
confidence: 99%
“…Hence, they are very critical to Internet service providers (ISPs) who provide network services to their individual subscribers and enterprise users who lease network lines over converged network services . Such damaging attacks have shifted the role of ISPs from simply providing network service to actively protecting themselves and their customers from the attacks . To minimize the damage incurred by such attacks, ISPs are adopting various techniques for botnet detection.…”
Section: Introductionmentioning
confidence: 99%