A SURVEY ON MULTI-AGENT BASED COLLABORATIVE INTRUSION DETECTION SYSTEMS

被引:13
作者
Bougueroua, Nassima [1 ]
Mazouzi, Smaine [1 ]
Belaoued, Mohamed [1 ]
Seddari, Noureddine [1 ]
Derhab, Abdelouahid [2 ]
Bouras, Abdelghani [3 ]
机构
[1] 20 August 1955 Univ Skikda, Dept Comp Sci, Skikda, Algeria
[2] King Saud Univ, Ctr Excellence Informat Assurance COEIA, Riyadh, Saudi Arabia
[3] Alfaisal Univ, Dept Ind Engn, Riyadh 12714, Saudi Arabia
关键词
IDS; CIDS; MAS; Artificial Intelligence; NEURAL-NETWORK; SECURITY; ALGORITHM; SVM; OPTIMIZATION; FRAMEWORK; INTERNET; COLONY;
D O I
10.2478/jaiscr-2021-0008
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Multi-Agent Systems (MAS) have been widely used in many areas like modeling and simulation of complex phenomena, and distributed problem solving. Likewise, MAS have been used in cyber-security, to build more efficient Intrusion Detection Systems (IDS), namely Collaborative Intrusion Detection Systems (CIDS). This work presents a taxonomy for classifying the methods used to design intrusion detection systems, and how such methods were used alongside with MAS in order to build IDS that are deployed in distributed environments, resulting in the emergence of CIDS. The proposed taxonomy, consists of three parts: 1) general architecture of CIDS, 2) the used agent technology, and 3) decision techniques, in which used technologies are presented. The proposed taxonomy reviews and classifies the most relevant works in this topic and highlights open research issues in view of recent and emerging threats. Thus, this work provides a good insight regarding past, current, and future solutions for CIDS, and helps both researchers and professionals design more effective solutions.
引用
收藏
页码:111 / 142
页数:32
相关论文
共 200 条
[1]   Ontology-based Distributed Intrusion Detection System [J].
Abdoli, F. ;
Kahani, M. .
2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, :65-+
[2]  
Aburomman AA, 2016, 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL, ELECTRONIC AND SYSTEMS ENGINEERING (ICAEES), P362, DOI 10.1109/ICAEES.2016.7888070
[3]  
Achbarou Omar, 2018, INT J COMMUNICATION, V10, P2018
[4]  
Adam MARCZYK, 2017, STUDIES COMPUTATIONA, V652, P309
[5]  
Akyazi U, 2012, COMPUT INFORM, V31, P759
[6]   Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues [J].
Aldweesh, Arwa ;
Derhab, Abdelouahid ;
Emam, Ahmed Z. .
KNOWLEDGE-BASED SYSTEMS, 2020, 189
[7]  
Alom MZ, 2015, PROC NAECON IEEE NAT, P339, DOI 10.1109/NAECON.2015.7443094
[8]  
Annappaian Dinesha Hagare, 2014, T NETWORKS COMMUNICA, V2, P12
[9]  
[Anonymous], 2011, 2011 16 INT C INT SY
[10]  
[Anonymous], 1982, CRYPTOGRAPHY DATA SE