Embedding agents within the intruder to detect parallel attacks.
Philippa J. BroadfootA. W. RoscoePublished in: J. Comput. Secur. (2004)
Keyphrases
- multi agent systems
- multi agent
- watermarking algorithm
- multiagent systems
- autonomous agents
- multiple agents
- intelligent agents
- cooperative
- mobile agents
- network attacks
- dynamic environments
- software agents
- watermarking technique
- parallel implementation
- artificial agents
- detecting malicious
- detect malicious
- interacting agents
- blind watermarking
- countermeasures
- detection algorithm
- parallel processing
- agent architecture
- detection method
- automatic detection
- digital images
- intrusion detection
- vector space
- learning agents
- agent systems
- game theoretic
- coalition formation
- parallel computing
- watermarking scheme
- single agent
- game theory
- shared memory
- agent model
- normal traffic
- denial of service attacks
- watermark embedding
- network security
- image watermarking
- information hiding
- digital watermarking
- trust model
- jpeg compression