Skip to main content

Intelligent Multi-agent Based Genetic Fuzzy Ensemble Network Intrusion Detection

  • Conference paper
Neural Information Processing (ICONIP 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3316))

Included in the following conference series:

Abstract

This paper proposes a distributed superior approach for preventing malicious access to corporate information system. It is to identify a foolproof system to obviate the manual analysis and breaches in the networking system by using a distributed approach and a technique of genetic algorithm that automates the generation of fuzzy rules. The experimental study is performed using audit data provided by MIT Lincoln labs. In order to reduce single point of failures in centralized security system, a dynamic distributed system has been designed in which the security management task is distributed across the network using Intelligent Multi-Agents.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. KDD-cup data set (2004), Available at, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  2. Michael, C.C., Ghosh, A.: Simple, State-Based Approaches to Program-Based Anomaly Detection. ACM Transactions on Information and System Security 5, 203–237 (2002)

    Article  Google Scholar 

  3. Ye, N., Vilbert, S., Chen, Q.: Computer Intrusion Detection through EWMA for Autocorrelated and Uncorrelated Data. Proceedings of IEEE Transactions on Reliability 52, 75–82 (2003)

    Article  Google Scholar 

  4. Pikoulas, J., Buchanan, W.J., Manion, M., Triantafyllopoulos, K.: An intelligent agent intrusion system. In: Proceedings of the 9th IEEE International Conference and Workshop on the Engineering of Computer Based Systems - ECBS, pp. 94–102. IEEE Comput. Soc., Luden, Sweden (2002)

    Chapter  Google Scholar 

  5. Java Aglet, IBM Tokyo Research Laboratory (2004), Available at, http://www.trl.ibm.co.jp/aglets

  6. Triantafyllopoulos, K., Pikoulas, J.: Multivariate Bayesian regression applied to the problem of network security. Journal of Forecasting 21, 579–594 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sindhu, S.S.S., Ramasubramanian, P., Kannan, A. (2004). Intelligent Multi-agent Based Genetic Fuzzy Ensemble Network Intrusion Detection. In: Pal, N.R., Kasabov, N., Mudi, R.K., Pal, S., Parui, S.K. (eds) Neural Information Processing. ICONIP 2004. Lecture Notes in Computer Science, vol 3316. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30499-9_152

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30499-9_152

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23931-4

  • Online ISBN: 978-3-540-30499-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics