An overview of recent advances in intrusion detection

The intrusion detection system is one of the security defense tools for computer networks. In recent years this research has lacked in direction and focus. In this paper we present a survey on the recent progression of multiagent intrusion detection systems. We survey the existing types, techniques and architectures of Intrusion Detection Systems in the literature. Finally we outline the present research challenges and issues.

[1]  Sehun Kim,et al.  An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks , 2004, WISA.

[2]  Byung-Joo Kim,et al.  Kernel based intrusion detection system , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).

[3]  José M. Vidal,et al.  Multiagent network security system using FIPA-OS , 2002, Proceedings IEEE SoutheastCon 2002 (Cat. No.02CH37283).

[4]  Michaël Rusinowitch,et al.  Protocol analysis in intrusion detection using decision tree , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[5]  P. Matzinger Tolerance, danger, and the extended family. , 1994, Annual review of immunology.

[6]  Sushil Jajodia,et al.  Intrusion Detection Techniques , 2004 .

[7]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..

[8]  R. Sekar,et al.  Experiences with Specification-Based Intrusion Detection , 2001, Recent Advances in Intrusion Detection.

[9]  Mohamed Ben Ahmed,et al.  A Framework for an Adaptive Intrusion Detection System using Bayesian Network , 2007, 2007 IEEE Intelligence and Security Informatics.

[10]  Amparo Alonso-Betanzos,et al.  A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture , 2007, KES-AMSTA.

[11]  Azman Samsudin,et al.  Grid-based intrusion detection system , 2003, 9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732).

[12]  Sandip Sen,et al.  Agent-Based Distributed Intrusion Alert System , 2004, IWDC.

[13]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[14]  Mohammad Zulkernine,et al.  Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).

[15]  Mohammad Zulkernine,et al.  DIDMA: a distributed intrusion detection system using mobile agents , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.

[16]  D. Dasgupta,et al.  Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.

[17]  Yi Hu,et al.  A data mining approach for database intrusion detection , 2004, SAC '04.

[18]  Eugene H. Spafford,et al.  Intrusion detection using autonomous agents , 2000, Comput. Networks.

[19]  Eugene H. Spafford,et al.  An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[20]  Victor K.-W. Wei,et al.  Preemptive distributed intrusion detection using mobile agents , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[21]  Mauricio Papa,et al.  A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems , 2005, The 14th IEEE International Conference on Fuzzy Systems, 2005. FUZZ '05..

[22]  Xin Wang,et al.  A Novel Peer-to-Peer Intrusion Detection System , 2005, Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05).

[23]  Philip K. Chan,et al.  An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.

[24]  Richard A. Kemmerer,et al.  State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..