2019
DOI: 10.1016/j.jnca.2019.102422
|View full text |Cite
|
Sign up to set email alerts
|

Distributed intrusion detection scheme for next generation networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…In recent years, collaborative architecture remains in the interest of several works [100,154,121,78,202]: for their robustness and scalability, compared to centralized architectures. In a collaborative system, removing the central entity results in peer to peer (P2P) organisation, where no more privileges are accorded to any entity regarding others [157].…”
Section: Distributed (Decentralized)mentioning
confidence: 99%
“…In recent years, collaborative architecture remains in the interest of several works [100,154,121,78,202]: for their robustness and scalability, compared to centralized architectures. In a collaborative system, removing the central entity results in peer to peer (P2P) organisation, where no more privileges are accorded to any entity regarding others [157].…”
Section: Distributed (Decentralized)mentioning
confidence: 99%
“…In the decentralized structure, there are a few studies that used mechanisms for load balancing. In [102], A method to control the CPU usage ratio of the IDS server with both normal traffic and flooding attacks was used. The method works by managing registration requests of the clients to keep low CPU load on the IDS server.…”
Section: ) Load Balancingmentioning
confidence: 99%
“…Centralized/ Decentralized Collaboration 3 [14] Distributed Distributed. Decentralized Coordination and scalability 4 [44] Distributed Decentralized Decentralized Fault-tolerance 5 [45] Distributed Decentralized Decentralized Robustness and fault tolerance 6 [49], [50], [57], [106] Distributed Distributed Decentralized Cooperation 7 [51] Distributed Distributed Decentralized Cooperation, learning and scalability 8 [54] Distributed Decentralized Centralized Self-orgnization 9 [59] Distributed Centralized Centralized Self-healing 10 [61] Distributed Distributed Decentralized Coordination, scalability and load balancing 11 [65] Distributed Distributed Decentralized Adaptation, self healing and cooperation 12 [66] Distributed Decentralized Decentralized Cooperation, coordination, scalability and learning 13 [68] Distributed Decentralized Decentralized Cooperation, learning, and self-adaptation 14 [70] Distributed Decentralized Decentralized Adaptation and intelligence 15 [95], [101] Distributed Decentralized Decentralized Cooperation 16 [79] Distributed Distributed Decentralized Cooperation, extendability,load balancing and fault tolerance 17 [87] Distributed Distributed Centralized Cooperation and reasoning 18 [93] Distributed Decentralized Decentralized Autonomy and cooperation 19 [102] Distributed Distributed Decentralized fault tolerance 20 [107] Distributed Decentralized Decentralized Cooperation, scalability Dynamically adaptive structure (20 studies) 1 [5] Distributed Dynamic. Centralized Adaptation and collaboration 2 [16] Distributed Decentralized Centralized Collaboration, adaptation, reliability 3 [35] Distributed Decentralized centralized Adaptation, coordination and learnung 4 [37] Distributed Centralized Centralized self management 5 [48] Distributed Decentralized Centralized/ Decentralized Scalability, collaborative, learning, and robustness [62] Distributed Decentralized Decentralized Cooperation, adaptation, scalability and learning 13 [67] Distributed Centralized Centralized Adaptation, cooper...…”
Section: A Multi-agent Ids Architectural Properties and Characteristicsmentioning
confidence: 99%
See 1 more Smart Citation
“…Session Initiation Protocol (SIP) (3) proposed to solve various issues in the IP Multimedia Subsystem and minimize vulnerability to the phase of registration . Attacks called DDoS focused on the protocol system and structure further proposed for identifying the intrusion in a distributed system with its baseline techniques.…”
Section: Introductionmentioning
confidence: 99%