Adaptive Ensemble Multi-Agent Based Intrusion Detection Model

Heavy reliance on the Internet has greatly increased the potential damage that can be inflicted by remote attacks launched over the Internet. It is difficult to prevent such attacks by security policies, firewalls, or other mechanisms. The computer system and the applications always contain unknown weaknesses or bugs attackers continually exploit them. Intrusion Detection Systems (IDS) are designed to detect attacks, which inevitably occur despite security precautions. A powerful IDS is flexible enough to detect novel attacks (i.e. it has the ability to generalize). The accuracy of the IDS depends on the false positive rate and the false negative rate measuring criteria. False positive rate calculates the rate of events that are considered to be intrusions where they are in fact normal events. However, ABSTRACT

[1]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[2]  Sandeep Kumar,et al.  A Software Architecture to Support Misuse Intrusion Detection , 1995 .

[3]  Steven Cheung,et al.  The threat from the net [Internet security] , 1997 .

[4]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[5]  Ajith Abraham,et al.  Neuro Fuzzy Systems: Sate-of-the-Art Modeling Techniques , 2001, IWANN.

[6]  Finn V. Jensen,et al.  Bayesian Networks and Decision Graphs , 2001, Statistics for Engineering and Information Science.

[7]  Eibe Frank,et al.  A Simple Approach to Ordinal Classification , 2001, ECML.

[8]  Ajith Abraham,et al.  Intrusion Detection Using Ensemble of Soft Computing Paradigms , 2003 .

[9]  Daoqiang Zhang,et al.  Hybrid neural network and C4.5 for misuse detection , 2003, Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).

[10]  Sugata Sanyal,et al.  Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[11]  Andrew H. Sung,et al.  Intrusion Detection Systems Using Adaptive Regression Splines , 2004, ICEIS.

[12]  Andrew H. Sung,et al.  Modeling intrusion detection systems using linear genetic programming approach , 2004 .

[13]  J. Ross Quinlan,et al.  Induction of Decision Trees , 1986, Machine Learning.

[14]  Csilla Farkas,et al.  PAID: A Probabilistic Agent-Based Intrusion Detection system , 2005, Comput. Secur..

[15]  Cheng Xiang,et al.  Design of Multiple-Level Hybrid Classifier for Intrusion Detection System , 2005 .

[16]  Ajith Abraham,et al.  Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..

[17]  Ajith Abraham,et al.  Modeling intrusion detection system using hybrid intelligent systems , 2007, J. Netw. Comput. Appl..

[18]  Yi Zhang,et al.  Predicting intrusion goal using dynamic Bayesian network with transfer probability estimation , 2009, J. Netw. Comput. Appl..

[19]  Aboul Ella Hassanien,et al.  Developing Advanced Web Services through P2P Computing and Autonomous Agents: Trends and Innovations , 2010 .

[20]  G. Bochmann,et al.  Peer-to-Peer Platforms for High-Quality Web Services: The Case for Load-Balanced Clustered Peer-to-Peer Systems , 2010 .

[21]  Liang Jie-Zhang Innovations, Standards, and Practices of Web Services: Emerging Research Topics , 2011 .

[22]  Nawal Guermouche,et al.  Characterizing Compatibility of Timed Choreography , 2011, Int. J. Web Serv. Res..

[23]  Fuchun Sun,et al.  An Improved Particle Swarm Optimization Algorithm Based on Quotient Space Theory , 2012, Int. J. Softw. Sci. Comput. Intell..

[24]  Laura Díaz,et al.  Discovery of Geospatial Resources: Methodologies, Technologies, and Emergent Applications , 2012 .

[25]  Derrick G. Kourie,et al.  An Assessment of Several Taxonomies of Volunteered Geographic Information , 2012 .

[26]  Ina Fourie E‐activity and Intelligent Web Construction: Effects of Social Design , 2012 .

[27]  Edward Pultar Data Mining Location-Based Social Networks for Geospatial Discovery , 2012 .