This HTML5 document contains 51 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n16http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n21http://purl.org/net/nknouf/ns/bibtex#
n8http://localhost/temp/predkladatel/
n19http://linked.opendata.cz/resource/domain/vavai/projekt/
n15http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n14http://linked.opendata.cz/ontology/domain/vavai/
n17https://schema.org/
n7http://linked.opendata.cz/resource/domain/vavai/zamer/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n4http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n9http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F68407700%3A21230%2F07%3A03132693%21RIV08-MSM-21230___/
n5http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n12http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n20http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n10http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n22http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n6http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n18http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F68407700%3A21230%2F07%3A03132693%21RIV08-MSM-21230___
rdf:type
skos:Concept n14:Vysledek
dcterms:description
Práce předsatvuje přehled problematiky detekce intruzí v síťovém prostředí a analyzuje její současný stav s ohledem na ansazení agentních metod pro řešení některých vhodných problematik. Práce proto také analyzuje tyto metody, a předkládá referenční abstraktní architekturu pro jejich integraci do IDS=IPS systému. While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconnected from the recent advances in the multi-agent research, most notably the field of trust modeling. Our contribution reviews recent implementations of IDS systems and presents them from an agent research perspective. We also identify the opportunities where the agent approaches can be successfully used. Agent techniques can make the IDS more adaptive, scalable and reliable while increasing their autonomy and reducing the maintenance requirements. Besides trust modeling, we propose that the distributed decision-making and planning techniques can be used to shorten the detection-response loop, making the system more robust while facing worm attacks. While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconnected from the recent advances in the multi-agent research, most notably the field of trust modeling. Our contribution reviews recent implementations of IDS systems and presents them from an agent research perspective. We also identify the opportunities where the agent approaches can be successfully used. Agent techniques can make the IDS more adaptive, scalable and reliable while increasing their autonomy and reducing the maintenance requirements. Besides trust modeling, we propose that the distributed decision-making and planning techniques can be used to shorten the detection-response loop, making the system more robust while facing worm attacks.
dcterms:title
Agent Methods for Network Intrusion Detection and Response Agentní metody pro detekci intruzí v sítích Agent Methods for Network Intrusion Detection and Response
skos:prefLabel
Agent Methods for Network Intrusion Detection and Response Agent Methods for Network Intrusion Detection and Response Agentní metody pro detekci intruzí v sítích
skos:notation
RIV/68407700:21230/07:03132693!RIV08-MSM-21230___
n4:strany
149;160
n4:aktivita
n10:P n10:Z
n4:aktivity
P(1M0567), Z(MSM6840770038)
n4:dodaniDat
n18:2008
n4:domaciTvurceVysledku
n15:7332327 n15:2490013 n15:5513839 n15:4036050
n4:druhVysledku
n22:D
n4:duvernostUdaju
n12:S
n4:entitaPredkladatele
n9:predkladatel
n4:idSjednocenehoVysledku
408747
n4:idVysledku
RIV/68407700:21230/07:03132693
n4:jazykVysledku
n20:eng
n4:klicovaSlova
intrusion detection systems; multi-agent systems
n4:klicoveSlovo
n5:multi-agent%20systems n5:intrusion%20detection%20systems
n4:kontrolniKodProRIV
[68C04B804690]
n4:mistoKonaniAkce
Regensburg
n4:mistoVydani
Munich
n4:nazevZdroje
Holonic and Multi-Agent Systems for Manufacturing - HoloMAS 2007
n4:obor
n6:JC
n4:pocetDomacichTvurcuVysledku
4
n4:pocetTvurcuVysledku
5
n4:projekt
n19:1M0567
n4:rokUplatneniVysledku
n18:2007
n4:tvurceVysledku
Medvigy, D. Prokopová, Magdalena Pěchouček, Michal Tožička, Jan Rehák, Martin
n4:typAkce
n16:WRD
n4:zahajeniAkce
2007-09-03+02:00
n4:zamer
n7:MSM6840770038
s:numberOfPages
12
n21:hasPublisher
Springer-Verlag
n17:isbn
978-3-540-74478-8
n8:organizacniJednotka
21230