An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique
暂无分享,去创建一个
Nor Badrul Anuar | Ahmed Patel | Miss Laiha Mat Kiah | Shahaboddin Shamshirband | N. B. Anuar | M. L. M. Kiah | S. Shamshirband | Ahmed Patel
[1] C. Lucas,et al. Intrusion detection using a fuzzy genetics-based learning algorithm , 2007, J. Netw. Comput. Appl..
[2] Afrand Agah,et al. Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach , 2007, Int. J. Netw. Secur..
[3] Guofei Gu,et al. Measuring intrusion detection capability: an information-theoretic approach , 2006, ASIACCS '06.
[4] Russell C. Eberhart,et al. Computational intelligence - concepts to implementations , 2007 .
[5] Xin Xu,et al. A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls , 2005, ICIC.
[6] John A. Clark,et al. A grammatical evolution approach to intrusion detection on mobile ad hoc networks , 2009, WiSec '09.
[7] Jonatan Gómez,et al. Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .
[8] Chunhui Zhao,et al. A Detection Method for Routing Attacks of Wireless Sensor Network Based on Fuzzy C-means Clustering , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.
[9] Daniel Curiac,et al. Ensemble based sensing anomaly detection in wireless sensor networks , 2012, Expert Syst. Appl..
[10] Xiao-Ping Zhang,et al. Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part I , 2005, ICIC.
[11] Li Jun,et al. HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .
[12] Xin Xu,et al. Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..
[13] Siavash Khorsandi,et al. Coordination of cooperation policies in a peer-to-peer system using swarm-based RL , 2012, J. Netw. Comput. Appl..
[14] Rituparna Chaki,et al. Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .
[15] Wang Jie,et al. The method of network intrusion detection based on the neural network GCBP algorithm , 2012, 2012 International Conference on Computer Science and Information Processing (CSIP).
[16] K. L. Shunmuganathan,et al. Multi-Agent-Based Anomaly Intrusion Detection , 2011, Inf. Secur. J. A Glob. Perspect..
[17] Sang Hyuk Son,et al. Using fuzzy logic for robust event detection in wireless sensor networks , 2012, Ad Hoc Networks.
[18] Sajal K. Das,et al. Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[19] Julie A. Dickerson,et al. Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).
[20] Maria Papadaki,et al. Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM) , 2013, Secur. Commun. Networks.
[21] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[22] Ali Moeini,et al. NFIDS: a neuro-fuzzy intrusion detection system , 2003, 10th IEEE International Conference on Electronics, Circuits and Systems, 2003. ICECS 2003. Proceedings of the 2003.
[23] Rajive Bagrodia,et al. ComSen: A Detection System for Identifying Compromised Nodes in Wireless Sensor Networks , 2012, SECURWARE 2012.
[24] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[25] J. Buckley,et al. Fuzzy genetic algorithm and applications , 1994 .
[26] Ahmed Patel,et al. Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing , 2012, CSS.
[27] Sugata Sanyal,et al. Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[28] Eduardo F. Morales,et al. An Introduction to Reinforcement Learning , 2011 .
[29] Yinhui Li,et al. An efficient intrusion detection system based on support vector machines and gradually feature removal method , 2012, Expert Syst. Appl..
[30] S. V. Raghavan,et al. Intrusion detection through learning behavior model , 2001, Comput. Commun..
[31] Ravi Jain,et al. D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..
[32] Mohammad S. Obaidat,et al. FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks , 2008, Comput. Commun..
[33] Pedro Malagón,et al. Improving security in WMNs with reputation systems and self-organizing maps , 2011, J. Netw. Comput. Appl..
[34] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[35] Frank Doelitzscher,et al. An agent based business aware incident detection system for cloud environments , 2012, Journal of Cloud Computing: Advances, Systems and Applications.
[36] Benton H. Calhoun,et al. Body Area Sensor Networks: Challenges and Opportunities , 2009, Computer.
[37] Andreas Fuchsberger,et al. Intrusion Detection Systems and Intrusion Prevention Systems , 2005, Inf. Secur. Tech. Rep..
[38] Ethem Alpaydin,et al. Introduction to machine learning , 2004, Adaptive computation and machine learning.
[39] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[40] Susan M. Bridges,et al. FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .
[41] Nick Antonopoulos,et al. Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks , 2010, Comput. Commun..
[42] Anupam Joshi,et al. Security Through Collaboration and Trust in MANETs , 2012, Mob. Networks Appl..
[43] Barbara Messing,et al. An Introduction to MultiAgent Systems , 2002, Künstliche Intell..
[44] Álvaro Herrero,et al. MOVIH-IDS: A mobile-visualization hybrid intrusion detection system , 2009, Neurocomputing.
[45] Levente Buttyán,et al. Secure and reliable clustering in wireless sensor networks: A critical survey , 2012, Comput. Networks.
[46] John A. Clark,et al. Evolutionary computation techniques for intrusion detection in mobile ad hoc networks , 2011, Comput. Networks.
[47] Georgios Kambourakis,et al. Swarm intelligence in intrusion detection: A survey , 2011, Comput. Secur..
[48] Nagaraju Devarakonda,et al. Integrated Bayes Network and Hidden Markov Model for Host based IDS , 2012 .
[49] Joseph S. Sherif,et al. Intrusion detection: systems and models , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[50] Lotfi A. Zadeh,et al. Soft computing and fuzzy logic , 1994, IEEE Software.
[51] Alexandros G. Fragkiadakis,et al. Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype , 2012, EURASIP J. Wirel. Commun. Netw..
[52] Ahmed Patel,et al. An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..
[53] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).
[54] N.B. Idris,et al. Artificial Intelligence Techniques Applied to Intrusion Detection , 2005, 2005 Annual IEEE India Conference - Indicon.
[55] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[56] Gyula Simon,et al. Sensor network-based countersniper system , 2004, SenSys '04.
[57] Patrick van der Smagt,et al. Introduction to neural networks , 1995, The Lancet.
[58] Fabio A. González,et al. CIDS: An agent-based intrusion detection system , 2005, Comput. Secur..
[59] Cheryl Surman,et al. Wireless sensors and sensor networks for homeland security applications. , 2012, Trends in analytical chemistry : TRAC.
[60] Richard S. Sutton,et al. Introduction to Reinforcement Learning , 1998 .
[61] Robert Fullér,et al. Introduction to neuro-fuzzy systems , 1999, Advances in soft computing.
[62] Sanjay Jha,et al. Wireless Sensor Networks for Battlefield Surveillance , 2006 .
[63] Hsiao-Hwa Chen,et al. Reduced Complexity Intrusion Detection in Sensor Networks Using Genetic Algorithm , 2009, 2009 IEEE International Conference on Communications.
[64] Arturo Ribagorda,et al. Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming , 2010, 2010 International Conference on Availability, Reliability and Security.
[65] Bernhard Sick,et al. Learning from others: Exchange of classification rules in intelligent distributed systems , 2012, Artif. Intell..
[66] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[67] Mohammad Saniee Abadeh,et al. A parallel genetic local search algorithm for intrusion detection in computer networks , 2007, Eng. Appl. Artif. Intell..
[68] Boubaker Daachi,et al. Application of fuzzy inference systems to detection of faults in wireless sensor networks , 2012, Neurocomputing.
[69] G. Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[70] A. Piskozub,et al. Real-Time Intrusion Prevention and Anomaly Analyze System for Corporate Networks , 2007, 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.
[71] H. Javitz,et al. Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System ( NIDES ) 1 , 1997 .
[72] Jianqing Ma,et al. SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks , 2006, WISA.
[73] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[74] Q. Liang,et al. Event detection in wireless sensor networks using fuzzy logic system , 2005, CIHSPS 2005. Proceedings of the 2005 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, 2005..
[75] Adel Nadjaran Toosi,et al. A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers , 2007, Comput. Commun..
[76] Qiming He,et al. Using reinforcement learning for pro-active network fault management , 2000, WCC 2000 - ICCT 2000. 2000 International Conference on Communication Technology Proceedings (Cat. No.00EX420).
[77] Boleslaw K. Szymanski,et al. NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS , 2002 .
[78] Juan Hernández-Serrano,et al. Towards a Cooperative Intrusion Detection System for Cognitive Radio Networks , 2011, Networking Workshops.
[79] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[80] Robert Tappan Morris,et al. Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2001, MobiCom '01.
[81] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[82] Yifeng Zeng,et al. EXPERIMENTS WITH ONLINE REINFORCEMENT LEARNING IN REAL-TIME STRATEGY GAMES , 2009, Appl. Artif. Intell..
[83] Igor Skrjanc,et al. Fault detection for nonlinear systems with uncertain parameters based on the interval fuzzy model , 2007, Eng. Appl. Artif. Intell..
[84] Malcolm I. Heywood,et al. A Hierarchical SOM based Intrusion Detection System , 2008 .
[85] Shu-Chin Wang,et al. An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011, Expert Syst. Appl..
[86] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[87] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[88] Andrew J. Clark,et al. Data preprocessing for anomaly based network intrusion detection: A review , 2011, Comput. Secur..
[89] Raquel Barco,et al. Optimization of load balancing using fuzzy Q-Learning for next generation wireless networks , 2013, Expert Syst. Appl..
[90] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[91] Xin Xu,et al. Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning , 2007, PAISI.
[92] Peter J. Bentley,et al. Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[93] A. Halim Zaim,et al. A hybrid intrusion detection system design for computer network security , 2009, Comput. Electr. Eng..
[94] Majid Nili Ahmadabadi,et al. Cooperative Q-learning: the knowledge sharing issue , 2001, Adv. Robotics.
[95] Amparo Alonso-Betanzos,et al. A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture , 2007, KES-AMSTA.
[96] Nong Ye,et al. A Markov Chain Model of Temporal Behavior for Anomaly Detection , 2000 .
[97] Jens Myrup Pedersen,et al. WITHDRAWN: An intelligent collaborative Intrusion Detection and Prevention System for Smart Grid environments , 2013 .
[98] Huang Tianshu,et al. A Fast Fuzzy Set Intrusion Detection Model , 2008, 2008 International Symposium on Knowledge Acquisition and Modeling.
[99] Yu-Fang Chung,et al. Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining , 2013, Inf. Sci..