Improving of the security of intrusion detection system

Agent-oriented hardware and software are proposed to use in order to improve security of intrusion detection system. A generalized structure of intelligent intrusion detection system was developed. A neural network was used as its main agent. Neural network immune detectors were implemented on the programmable logic arrays in order to detect and classify intrusions. Mamdani fuzzy inference rules were applied to counteract intrusions. A decision-making subsystem structure was developed.

[1]  Shilpa Lakhina,et al.  Feature Reduction using Principal Component Analysis for Effective Anomaly – Based Intrusion Detection on NSL-KDD , 2010 .

[2]  Igor Kotenko,et al.  MULTI-AGENT SIMULATION OF ATTACKS AND DEFENSE MECHANISMS IN COMPUTER NETWORKS , 2008 .

[3]  Yit Yin Wee,et al.  Causal Discovery and Reasoning for Intrusion Detectionusing Bayesian Network , 2011 .

[4]  George Stephanopoulos,et al.  Knowledge-Based System Applications in Engineering Design: Research at MIT , 1989, AI Mag..

[5]  Fernando Niño,et al.  Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..

[6]  Sergey D. Shtovba,et al.  Ensuring Accuracy and Transparency of Mamdani Fuzzy Model in Learning by Experimental Data , 2007 .

[7]  Jian Ma,et al.  A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..

[8]  Michael Wooldridge,et al.  Intelligent agents: theory and practice The Knowledge Engineering Review , 1995 .

[9]  José Manuel Moya,et al.  Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps , 2010, Integr. Comput. Aided Eng..

[10]  K. Sycara,et al.  This Is a Publication of the American Association for Artificial Intelligence Multiagent Systems Multiagent System Issues and Challenges Individual Agent Reasoning Task Allocation Multiagent Planning Recognizing and Resolving Conflicts Managing Communication Modeling Other Agents Managing Resources , 2022 .

[11]  Oleg Savenko,et al.  Multi-agent Based Approach of Botnet Detection in Computer Systems , 2012, CN.

[12]  L. Ibrahim ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN) , 2010 .

[13]  Vladimir A. Golovko,et al.  Development of neural network immune detectors for computer attacks recognition and classification , 2013, 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS).

[14]  Nicholas R. Jennings,et al.  Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.

[15]  Lesia Dubchak,et al.  Fuzzy data processing method , 2013, 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS).

[16]  Gerhard Weiss,et al.  Multiagent Systems , 1999 .

[17]  Dewan Md. Farid,et al.  Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm , 2010, J. Comput..

[18]  Ian T. Jolliffe,et al.  Principal Component Analysis , 2002, International Encyclopedia of Statistical Science.

[19]  Vladimir Golovko,et al.  FUSION OF RECIRCULATION NEURAL NETWORKS FOR REAL-TIME NETWORK INTRUSION DETECTION AND RECOGNITION , 2014 .

[20]  Vladimir A. Golovko,et al.  Intelligent system for detection of networking intrusion , 2011, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems.