2000
DOI: 10.1016/s1389-1286(00)00136-5
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection using autonomous agents

Abstract: AAFID is a distributed intrusion detection architecture and system, developed in CERIAS at Purdue University. AAFID was the ®rst architecture that proposed the use of autonomous agents for doing intrusion detection. With its prototype implementation, it constitutes a useful framework for the research and testing of intrusion detection algorithms and mechanisms. We describe the AAFID architecture and the existing prototype, as well as some design and implementation experiences and future research issues. Ó

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
126
0
2

Year Published

2004
2004
2015
2015

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 260 publications
(128 citation statements)
references
References 8 publications
0
126
0
2
Order By: Relevance
“…An intrusion detection system (IDS) was introduced into the smart grid preventing the attacks against AMI in smart grid [15] - [18]. Different attacks against AMI are analyzed, which should be timely detected.…”
Section: B Active Defensementioning
confidence: 99%
“…An intrusion detection system (IDS) was introduced into the smart grid preventing the attacks against AMI in smart grid [15] - [18]. Different attacks against AMI are analyzed, which should be timely detected.…”
Section: B Active Defensementioning
confidence: 99%
“…Early examples of these systems are [20], [17], [26], and [21]. A starting point for DIDSs is the collaboration between Lawrence Livermore National Labs, U.S. Air Force and other organizations [20].…”
Section: Related Workmentioning
confidence: 99%
“…By using both models, the system prioritizes which network events to monitor. AAFID [21] is a distributed framework based on software agents to collect and analyze data and used as a platform to develop intrusion detection techniques. An interesting policy-based proposal based on the popular Bro IDS [15] was presented in [6], using intrusion detection sensors in a distributed, collaborative manner.…”
Section: Related Workmentioning
confidence: 99%
“…In these propositions the audit of data collected is done in several points of the network and the analysis is executed by a central location. With CSM [9] and AAFID [10], the usage of distributed analysis agents is very relative.…”
Section: Related Workmentioning
confidence: 99%