All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Multi Agent Approach to Network Intrusion Detection (Demo Paper)

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F08%3A03145225" target="_blank" >RIV/68407700:21230/08:03145225 - isvavai.cz</a>

  • Result on the web

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    Multi Agent Approach to Network Intrusion Detection (Demo Paper)

  • Original language description

    Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of several anomaly detection techniques by means of collective trust modeling within a group of collaborative detection agents, each featuring a specific detection algorithm. The principal role of anomalies is to provide the input into the trust modeling stage of the detection, where each agent determines the flow trustfulness from aggregated anomalies. The aggregation is performed by extended trust models that model the trustfulness of generalized situated identities, represented by a set of observable features. The system is based on traffic statistics in NetFlow format acquired by dedicated hardware-accelerated network cards, and is able to perform a real-time surveillance of the gigabit networks.

  • Czech name

    Multiagentní přístup k detekci síťových intruzí

  • Czech description

    Nase demo predstavuje system detekce intruzi zalozeny na multi-agentni analyze dat z vysokoychlostnich paternich siti. Prinosem system je integrace nekolika technik detekce anomalii pomoci modelovani duveryhodnosti ve skupine spolupracujicich detekcnichagentu, kazdy z nichz je zalozen an jednom z integrovanych algoritmu. Anomalie produkovane AD technikami v agentech jsou pouzity jako vstup do modelu duveryhodnosti, ktere je integruji a vytvari z nich duveryhodnost prisouzenou abstraktnim kontextualizovanym identitam v prostoru definovanem vlastnostmi pouzitymi k detekci anomalii v metode daneho agenta. System je zalozen na analyze dat o sitovych tocich, bez pouziti vlastniho obsahu komunikace, ktera muze byt duverna ci sifrovana.

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    JD - Use of computers, robotics and its application

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/1M0567" target="_blank" >1M0567: Centre for Applied Cybernetics</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>Z - Vyzkumny zamer (s odkazem do CEZ)

Others

  • Publication year

    2008

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    AAMAS 2008 Conference Proceedings

  • ISBN

    978-0-9817381-0-9

  • ISSN

  • e-ISSN

  • Number of pages

    2

  • Pages from-to

  • Publisher name

    ACM Press

  • Place of publication

    New York

  • Event location

    Estoril

  • Event date

    May 12, 2008

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article