111,68 €
124,09 €
-10% with code: EXTRA
A Multi Agent System for Flow-Based Intrusion Detection Using Reputation and Evolutionary Computation
A Multi Agent System for Flow-Based Intrusion Detection Using Reputation and Evolutionary Computation
111,68
124,09 €
  • We will send in 10–14 business days.
The rising sophistication of cyber threats as well as the improvement of physical computer network properties present increasing challenges to contemporary Intrusion Detection (ID) techniques. To respond to these challenges, a multi agent system (MAS) coupled with flow-based ID techniques may effectively complement traditional ID systems. This paper develops: 1) a scalable software architecture for a new, self-organized, multi agent, flow-based ID system; and 2) a network simulation environment…
  • SAVE -10% with code: EXTRA

A Multi Agent System for Flow-Based Intrusion Detection Using Reputation and Evolutionary Computation (e-book) (used book) | bookbook.eu

Reviews

Description

The rising sophistication of cyber threats as well as the improvement of physical computer network properties present increasing challenges to contemporary Intrusion Detection (ID) techniques. To respond to these challenges, a multi agent system (MAS) coupled with flow-based ID techniques may effectively complement traditional ID systems. This paper develops: 1) a scalable software architecture for a new, self-organized, multi agent, flow-based ID system; and 2) a network simulation environment suitable for evaluating implementations of this MAS architecture and for other research purposes. Self-organization is achieved via 1) a "reputation" system that influences agent mobility in the search for effective vantage points in the network; and 2) multi objective evolutionary algorithms that seek effective operational parameter values. This paper illustrates, through quantitative and qualitative evaluation, 1) the conditions for which the reputation system provides a significant benefit; and 2) essential functionality of a complex network simulation environment supporting a broad range of malicious activity scenarios. These results establish an optimistic outlook for further research in flow-based multi agent systems for ID in computer networks.

EXTRA 10 % discount with code: EXTRA

111,68
124,09 €
We will send in 10–14 business days.

The promotion ends in 19d.10:29:47

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,24 Book Euros!?
  • Author: David L Hancock
  • Publisher:
  • ISBN-10: 1249586658
  • ISBN-13: 9781249586654
  • Format: 18.9 x 24.6 x 1 cm, softcover
  • Language: English English

The rising sophistication of cyber threats as well as the improvement of physical computer network properties present increasing challenges to contemporary Intrusion Detection (ID) techniques. To respond to these challenges, a multi agent system (MAS) coupled with flow-based ID techniques may effectively complement traditional ID systems. This paper develops: 1) a scalable software architecture for a new, self-organized, multi agent, flow-based ID system; and 2) a network simulation environment suitable for evaluating implementations of this MAS architecture and for other research purposes. Self-organization is achieved via 1) a "reputation" system that influences agent mobility in the search for effective vantage points in the network; and 2) multi objective evolutionary algorithms that seek effective operational parameter values. This paper illustrates, through quantitative and qualitative evaluation, 1) the conditions for which the reputation system provides a significant benefit; and 2) essential functionality of a complex network simulation environment supporting a broad range of malicious activity scenarios. These results establish an optimistic outlook for further research in flow-based multi agent systems for ID in computer networks.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)