About: Multi-Agent Approach to Network Intrusion Detection     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : http://linked.opendata.cz/ontology/domain/vavai/Vysledek, within Data Space : linked.opendata.cz associated with source document(s)

AttributesValues
rdf:type
Description
  • Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of several anomaly detection techniques by means of collective trust modeling within a group of collaborative detection agents, each featuring a specific detection algorithm. The principal role of anomalies is to provide the input into the trust modeling stage of the detection, where each agent determines the flow trustfulness from aggregated anomalies. The aggregation is performed by extended trust models that model the trustfulness of generalized situated identities, represented by a set of observable features. The system is based on traffic statistics in NetFlow format acquired by dedicated hardware-accelerated network cards, and is able to perform a real-time surveillance of the gigabit networks.
  • Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of several anomaly detection techniques by means of collective trust modeling within a group of collaborative detection agents, each featuring a specific detection algorithm. The principal role of anomalies is to provide the input into the trust modeling stage of the detection, where each agent determines the flow trustfulness from aggregated anomalies. The aggregation is performed by extended trust models that model the trustfulness of generalized situated identities, represented by a set of observable features. The system is based on traffic statistics in NetFlow format acquired by dedicated hardware-accelerated network cards, and is able to perform a real-time surveillance of the gigabit networks. (en)
  • Naše demo prezentuje systém detekce průniku založený na agentní platformě a navržený pro vysokorychlostní páteřní sítě. Hlavním přínosem systému je integrace několika metod pro detekci anomálií pomocí kolektivního trust modelování. Hlavní role anomálií je poskytnutí vstupu do fáze modelování trustu a detekce, kde každý agent určuje míru důvěryhodnosti toku z agregovaných anomálií. Agregace je prováděna pomocí rozšířeného trust modelu, reprezentovaného množinou pozorovaných vlastností. Systém je založen na síťových statistikách v NetFlow formátu, získávaných pomocí hardwarově urychlovaných síťových karet. Systém provádí analýzu gigabitových sítí v reálném čase. (cs)
Title
  • Multi-Agent Approach to Network Intrusion Detection
  • Multi-Agent Approach to Network Intrusion Detection (en)
  • Multi-agentní přístup k detekci průniků do sítě (cs)
skos:prefLabel
  • Multi-Agent Approach to Network Intrusion Detection
  • Multi-Agent Approach to Network Intrusion Detection (en)
  • Multi-agentní přístup k detekci průniků do sítě (cs)
skos:notation
  • RIV/63839172:_____/08:00000890!RIV09-MSM-63839172
http://linked.open...avai/riv/aktivita
http://linked.open...avai/riv/aktivity
  • Z(MSM6383917201)
http://linked.open...vai/riv/dodaniDat
http://linked.open...aciTvurceVysledku
http://linked.open.../riv/druhVysledku
http://linked.open...iv/duvernostUdaju
http://linked.open...titaPredkladatele
http://linked.open...dnocenehoVysledku
  • 381056
http://linked.open...ai/riv/idVysledku
  • RIV/63839172:_____/08:00000890
http://linked.open...riv/jazykVysledku
http://linked.open.../riv/klicovaSlova
  • trust; intrusion detection; network behavior analysis (en)
http://linked.open.../riv/klicoveSlovo
http://linked.open...ontrolniKodProRIV
  • [FF0661AFFF7B]
http://linked.open...v/mistoKonaniAkce
  • Estoril, Portugalsko
http://linked.open...i/riv/mistoVydani
  • Estoril
http://linked.open...i/riv/nazevZdroje
  • Proceeding of 7th International Conference on Autonomous Agents and Multiagent Systems -(AAMAS 2008) - Industrial and Applications Track
http://linked.open...in/vavai/riv/obor
http://linked.open...ichTvurcuVysledku
http://linked.open...cetTvurcuVysledku
http://linked.open...UplatneniVysledku
http://linked.open...iv/tvurceVysledku
  • Pěchouček, Michal
  • Čeleda, Pavel
  • Krmíček, Vojtěch
  • Bartoš, Karel
  • Grill, Martin
  • Rehák, Martin
http://linked.open...vavai/riv/typAkce
http://linked.open.../riv/zahajeniAkce
http://linked.open...n/vavai/riv/zamer
number of pages
http://purl.org/ne...btex#hasPublisher
  • Inesc-Id
https://schema.org/isbn
  • 9780981738130
is http://linked.open...avai/riv/vysledek of
Faceted Search & Find service v1.16.118 as of Jun 21 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3240 as of Jun 21 2024, on Linux (x86_64-pc-linux-gnu), Single-Server Edition (126 GB total memory, 58 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software