Approaching Real-Time Intrusion Detection through MOVICAB-IDS

被引:0
作者
Navarro, Marti [1 ]
Herrero, Alvaro [2 ]
Corchado, Emilio [3 ]
Julian, Vicente [1 ]
机构
[1] Univ Politecn Valencia, Dept Sistemas Informat & Computac, Camino Vera S-N, Valencia 46022, Spain
[2] Univ Burgos, Dept Civil Engn, Burgos 09006, Spain
[3] Univ Salamanca, Dept Informatica Automatica, Salamanca 37008, Spain
来源
SOFT COMPUTING MODELS IN INDUSTRIAL AND ENVIRONMENTAL APPLICATIONS | 2010年 / 73卷
关键词
Multiagent Systems; Hybrid Artificial Intelligent Systems; Computer Network Security; Intrusion Detection; Temporal Constraints; Time Bounded Deliberative Process; GAIA METHODOLOGY; IDENTIFICATION; ARCHITECTURE; DESIGN; SYSTEM; AGENT;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents an extension of MOVICAB-IDS, a Hybrid Intelligent Intrusion Detection System characterized by incorporating temporal control to enable real-time processing and response. The original formulation of MOVICAB-IDS combines artificial neural networks and case-based reasoning within a rnultiagent system to perform Intrusion Detection in dynamic computer networks. The contribution of the anytime algorithm, one of the most promising to adapt Artificial Intelligent techniques to real-time requirements; is comprehensively presented in this work.
引用
收藏
页码:9 / +
页数:4
相关论文
共 26 条
  • [1] AAMODT A, 1994, AI COMMUN, V7, P39
  • [2] D-SCIDS: Distributed soft computing intrusion detection system
    Abraham, Ajith
    Jain, Ravi
    Thomas, Johnson
    Han, Sang Yong
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) : 81 - 98
  • [3] [Anonymous], 1989, Case-based planning
  • [4] Babu S., 2001, WORKSH NETW REL DAT, P1
  • [5] Bajo J, 2007, LECT NOTES COMPUT SC, V4626, P389
  • [6] Hybrid multi-agent architecture as a real-time problem-solving model
    Carrascosa, C.
    Bajo, J.
    Julian, V.
    Corchado, J. M.
    Botti, V.
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2008, 34 (01) : 2 - 17
  • [7] Case J. D., 1990, RFC 1157
  • [8] Corchado E, 2005, LECT NOTES COMPUT SC, V3697, P905
  • [9] Connectionist techniques for the identification and suppression of interfering underlying factors
    Corchado, E
    Fyfe, C
    [J]. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2003, 17 (08) : 1447 - 1466
  • [10] Corchado E., 2010, APPL SOFT C IN PRESS