Applying mobile agents in an immune-system-based intrusion detection system.
Marek ZielinskiLucas M. VenterPublished in: South Afr. Comput. J. (2005)
Keyphrases
- mobile agents
- distributed intrusion detection
- intrusion detection system
- intrusion detection
- network security
- computer networks
- client server
- anomaly detection
- network intrusion detection
- distributed systems
- mobile agent technology
- mobile computing
- alert correlation
- fault tolerance
- network traffic
- agent technology
- mobile agent system
- attack detection
- mobile users
- network management
- intelligent agents
- misuse detection
- data mining techniques
- middleware architecture
- data mining
- unauthorized access
- cooperative
- databases
- intelligent systems
- unsupervised learning