Abstract
This paper proposes a distributed superior approach for preventing malicious access to corporate information system. It is to identify a foolproof system to obviate the manual analysis and breaches in the networking system by using a distributed approach and a technique of genetic algorithm that automates the generation of fuzzy rules. The experimental study is performed using audit data provided by MIT Lincoln labs. In order to reduce single point of failures in centralized security system, a dynamic distributed system has been designed in which the security management task is distributed across the network using Intelligent Multi-Agents.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
KDD-cup data set (2004), Available at, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
Michael, C.C., Ghosh, A.: Simple, State-Based Approaches to Program-Based Anomaly Detection. ACM Transactions on Information and System Security 5, 203–237 (2002)
Ye, N., Vilbert, S., Chen, Q.: Computer Intrusion Detection through EWMA for Autocorrelated and Uncorrelated Data. Proceedings of IEEE Transactions on Reliability 52, 75–82 (2003)
Pikoulas, J., Buchanan, W.J., Manion, M., Triantafyllopoulos, K.: An intelligent agent intrusion system. In: Proceedings of the 9th IEEE International Conference and Workshop on the Engineering of Computer Based Systems - ECBS, pp. 94–102. IEEE Comput. Soc., Luden, Sweden (2002)
Java Aglet, IBM Tokyo Research Laboratory (2004), Available at, http://www.trl.ibm.co.jp/aglets
Triantafyllopoulos, K., Pikoulas, J.: Multivariate Bayesian regression applied to the problem of network security. Journal of Forecasting 21, 579–594 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sindhu, S.S.S., Ramasubramanian, P., Kannan, A. (2004). Intelligent Multi-agent Based Genetic Fuzzy Ensemble Network Intrusion Detection. In: Pal, N.R., Kasabov, N., Mudi, R.K., Pal, S., Parui, S.K. (eds) Neural Information Processing. ICONIP 2004. Lecture Notes in Computer Science, vol 3316. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30499-9_152
Download citation
DOI: https://doi.org/10.1007/978-3-540-30499-9_152
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23931-4
Online ISBN: 978-3-540-30499-9
eBook Packages: Springer Book Archive