2016 4th IEEE International Colloquium on Information Science and Technology (CiSt) 2016
DOI: 10.1109/cist.2016.7805030
|View full text |Cite
|
Sign up to set email alerts
|

New model of intrusion detection based on multi agent systems and CBR paradigm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…LITERATURE SURVEY In this segment, we survey the existing literature on IDS frameworks. M. E. L. Ajjouri et al [1], the advancement of data frameworks requires the usage of an abnormal state of security to limit the issues related with these frameworks. Intrusion Detection Systems (IDS) plays a critical part in the security of systems by identifying when an attack is going on, yet most current IDS are by and large brought together and experience the ill effects of noteworthy constraints.…”
Section: E Hybrid Intrusion Detection Systemmentioning
confidence: 99%
“…LITERATURE SURVEY In this segment, we survey the existing literature on IDS frameworks. M. E. L. Ajjouri et al [1], the advancement of data frameworks requires the usage of an abnormal state of security to limit the issues related with these frameworks. Intrusion Detection Systems (IDS) plays a critical part in the security of systems by identifying when an attack is going on, yet most current IDS are by and large brought together and experience the ill effects of noteworthy constraints.…”
Section: E Hybrid Intrusion Detection Systemmentioning
confidence: 99%
“…M. E. L. Ajjouri et al [1], the advancement of data frameworks requires the usage of an abnormal state of security to limit the issues related with these frameworks. Intrusion Detection Systems (IDS) plays a critical part in the security of systems by identifying when an attack is going on, yet most current IDS are by and large brought together and experience the ill effects of noteworthy constraints.…”
Section: Literature Surveymentioning
confidence: 99%
“…Such outline decisions commonly show a tradeoff in which information freshness is yielded for decreased access latencies. There are numerous conceivable methodologies for productively taking care of the recourses so that to strike a fine harmony between both the nature of administration (QoS) and nature of information (QoD) [1] to be utilized for examination in distinguishing noxious exercises in cloud biological community. The cloud systems [2] information stream originate from time shifting procedures happening at various cloud end focuses , it isn't sufficient to ensure value of the information for finding noxious exercises with blend of old and new information ; we likewise should guarantee every exchange under perception is crisp, so continuous reaction chain can be manufacture.…”
Section: Introductionmentioning
confidence: 99%