2005
DOI: 10.1109/mp.2005.1462463
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating how well agent-based IDS perform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Another series of experiments were carried out to testify the feasibility of our resolution for intrusion detection in contrast to EssIDS experiments [19] as the Tab. 2 and Tab.3 showing.…”
Section: Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Another series of experiments were carried out to testify the feasibility of our resolution for intrusion detection in contrast to EssIDS experiments [19] as the Tab. 2 and Tab.3 showing.…”
Section: Results and Analysismentioning
confidence: 99%
“…Fig.7 shows when Ping Sweep Attack and DoS Attack occur, NetSTAT holds higher detection rate than other three-detection systems [19], [20], [21].…”
Section: Results and Analysismentioning
confidence: 99%
“…Apart from inheriting the original characteristics of Agent, immune agent also has the characters of evolution, diversity, tolerance and detection [7,8] properties etc. 1) Evolution: Following the evolution law, IA activates antibodies, which can effectively recognize antigens, into higher form, while eliminates the inefficient one.…”
Section: System Principles Of the Detection Model Based On Immune Mulmentioning
confidence: 99%