An overview of recent advances in intrusion detection

被引:5
作者
Marhusin, Mohd Fadzli [1 ]
Cornforth, David [1 ]
Larkin, Henry [1 ]
机构
[1] Univ New S Wales, Australian Def Force Acad, Sch ITEE, Canberra, ACT 2600, Australia
来源
2008 IEEE 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, VOLS 1 AND 2 | 2008年
关键词
D O I
10.1109/CIT.2008.4594714
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The intrusion detection system is one of the security defense tools for computer networks. In recent years this research has lacked in direction and focus. In this paper we present a survey on the recent progression of multiagent intrusion detection systems. We survey the existing types, techniques and architectures of Intrusion Detection Systems in the literature. Finally we outline the present research challenges and issues.
引用
收藏
页码:432 / 437
页数:6
相关论文
共 30 条
  • [1] Protocol analysis in intrusion detection using decision tree
    Abbes, T
    Boulloula, A
    Rusinowitch, M
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 404 - 408
  • [2] [Anonymous], INTERNET ENCY
  • [3] An architecture for intrusion detection using Autonomous Agents
    Balasubramaniyan, JS
    Garcia-Fernandez, JO
    Isacoff, D
    Spafford, E
    Zamboni, D
    [J]. 14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 13 - 24
  • [4] Bellifemine FL, 2007, DEV MULTIAGENT SYSTE
  • [5] BYUNGJOO K, 2005, 4 ANN ACIS INT C COM, P13
  • [6] *CERT, 2007, CERT STAT
  • [7] Preemptive distributed intrusion detection using mobile agents
    Chan, PC
    Wei, VK
    [J]. WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 103 - 108
  • [8] CROSBIE M, 1995, APPLYING GENETING PR
  • [9] DIPANKAR D, 2006, COMPUTATIONAL INTELL, V1, P40
  • [10] El-Semary A, 2005, IEEE INT CONF FUZZY, P325