2008 23rd International Symposium on Computer and Information Sciences 2008
DOI: 10.1109/iscis.2008.4717920
|View full text |Cite
|
Sign up to set email alerts
|

Distributed intrusion detection using mobile agents against DDoS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…Akyazi and Uyar proposed four methods; three of them use mobile agents [17]. Each method use Snort like a sensor.…”
Section: E Mobile Agent Techniquesmentioning
confidence: 99%
“…Akyazi and Uyar proposed four methods; three of them use mobile agents [17]. Each method use Snort like a sensor.…”
Section: E Mobile Agent Techniquesmentioning
confidence: 99%
“…The concept of agent mobility opened another dimension for scientific research in intrusion detection. Venkateshwaran and al propose some algorithms to ensure the security of the interaction of mobile agents in the Cloud environment [10]. In [7], O'Malley et al show that for the same work, mobile agent systems are 5 times faster than multi-agent systems.…”
Section: Related Workmentioning
confidence: 99%
“…As a result, we had done comparison of Sparta [25], Ugur Akyazi et al [31], Jing Xu [29], HAMA-IDS [30] and MSAIDS [26]. Such comparison is shown in …”
Section: Mobile Agentmentioning
confidence: 99%