A Systematic State-of-the-Art Analysis of Multi-Agent Intrusion Detection
Multi-agent architectures have been successful in attaining considerable attention among computer security researchers. This is so, because of their demonstrated capabilities such as autonomy, embedded intelligence, learning and self-growing knowledge-base, high scalability, fault tolerance, and aut...
Saved in:
Published in | IEEE access Vol. 8; pp. 180184 - 180209 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Multi-agent architectures have been successful in attaining considerable attention among computer security researchers. This is so, because of their demonstrated capabilities such as autonomy, embedded intelligence, learning and self-growing knowledge-base, high scalability, fault tolerance, and automatic parallelism. These characteristics have made this technology a de facto standard for developing ambient security systems to meet the open and dynamic nature of today's online communities. Although multi-agent architectures are increasingly studied in the area of computer security, there is still not enough empirical evidence on their performance in intrusions and attacks detection. The aim of this paper is to report the systematic literature review conducted in the context of specific research questions, to investigate multi-agent IDS architectures to highlight the issues that affect their performance in terms of detection accuracy and response time. We used pertinent keywords and terms to search and retrieve the most recent research studies, on multi-agent IDS architectures, from the major research databases and digital libraries such as SCOPUS, Springer, and IEEE Explore. The search processes resulted in a number of studies; among them, there were journal articles, book chapters, conference papers, dissertations, and theses. The obtained studies were assessed and filtered out, and finally, there were over 71 studies chosen to answer the research questions. The results of this study have shown that multi-agent architectures include several advantages that can help in the development of ambient IDS. However, it has been found that there are several issues in the current multi-agent IDS architectures that may degrade the accuracy and response time of intrusions and attacks detection. Based on our findings, the issues of multi-agent IDS architectures include limitations in the techniques, mechanisms, and schemes used for multi-agent IDS adaptation and learning, load balancing, scalability, fault-tolerance, and high communication overhead. It has also been found that new measurement metrics are required for evaluating multi-agent IDS architectures. |
---|---|
AbstractList | Multi-agent architectures have been successful in attaining considerable attention among computer security researchers. This is so, because of their demonstrated capabilities such as autonomy, embedded intelligence, learning and self-growing knowledge-base, high scalability, fault tolerance, and automatic parallelism. These characteristics have made this technology a de facto standard for developing ambient security systems to meet the open and dynamic nature of today’s online communities. Although multi-agent architectures are increasingly studied in the area of computer security, there is still not enough empirical evidence on their performance in intrusions and attacks detection. The aim of this paper is to report the systematic literature review conducted in the context of specific research questions, to investigate multi-agent IDS architectures to highlight the issues that affect their performance in terms of detection accuracy and response time. We used pertinent keywords and terms to search and retrieve the most recent research studies, on multi-agent IDS architectures, from the major research databases and digital libraries such as SCOPUS, Springer, and IEEE Explore. The search processes resulted in a number of studies; among them, there were journal articles, book chapters, conference papers, dissertations, and theses. The obtained studies were assessed and filtered out, and finally, there were over 71 studies chosen to answer the research questions. The results of this study have shown that multi-agent architectures include several advantages that can help in the development of ambient IDS. However, it has been found that there are several issues in the current multi-agent IDS architectures that may degrade the accuracy and response time of intrusions and attacks detection. Based on our findings, the issues of multi-agent IDS architectures include limitations in the techniques, mechanisms, and schemes used for multi-agent IDS adaptation and learning, load balancing, scalability, fault-tolerance, and high communication overhead. It has also been found that new measurement metrics are required for evaluating multi-agent IDS architectures. |
Author | Saeed, Imtithal A. Rohani, Mohd Foad Selamat, Ali Chaudhry, Junaid Ahsenali Krejcar, Ondrej |
Author_xml | – sequence: 1 givenname: Imtithal A. orcidid: 0000-0001-6467-0124 surname: Saeed fullname: Saeed, Imtithal A. organization: School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia UTM, Skudai, Malaysia – sequence: 2 givenname: Ali orcidid: 0000-0001-9746-8459 surname: Selamat fullname: Selamat, Ali email: aselamat@utm.my organization: School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia UTM, Skudai, Malaysia – sequence: 3 givenname: Mohd Foad surname: Rohani fullname: Rohani, Mohd Foad organization: School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia UTM, Skudai, Malaysia – sequence: 4 givenname: Ondrej orcidid: 0000-0002-5992-2574 surname: Krejcar fullname: Krejcar, Ondrej organization: Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, Hradec Kralove, Czech Republic – sequence: 5 givenname: Junaid Ahsenali orcidid: 0000-0003-2000-7915 surname: Chaudhry fullname: Chaudhry, Junaid Ahsenali organization: Duja Inc., Perth, WA, Australia |
BookMark | eNp9kU9v1DAQxS3USpS2n6CXSJyz9f_Yx2gpsFIRh4Wz5djj4lUaF9t72G-PS1qEOOCLR6P5jd6b9w6dLWkBhG4I3hCC9e243d7t9xuKKd4wTAcu2Rt0QYnUPRNMnv1Vv0XXpRxwe6q1xHCBdmO3P5UKj7ZG1-2rrdCn0Ncf0I-5duNi51OJpUuh-3Kca-zHB1hqt1tqPpaYlu4DVHC1VVfoPNi5wPXLf4m-f7z7tv3c33_9tNuO973jWNWeEzwFrpzg3gsXBGdhaKo19QIUt9IHKcPkMaVSYQrcWcomoZ0L3k-aKnaJduten-zBPOX4aPPJJBvN70bKD8bmZmYGwxWIiTAeJBdcSaspYEFgmtQQNBW-7Xq_7nrK6ecRSjWHdMzNczG0IXLQmuI2pdcpl1MpGYJxsR2qea7ZxtkQbJ6DMGsQ5jkI8xJEY9k_7Kvi_1M3KxUB4A_RtAyaMPYLkMGUng |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_3390_electronics10233016 crossref_primary_10_3390_electronics10212711 crossref_primary_10_1109_TNNLS_2021_3121870 crossref_primary_10_1016_j_cose_2024_103871 crossref_primary_10_3390_s23031283 |
Cites_doi | 10.1016/j.comcom.2014.01.012 10.1109/MC.2002.1012428 10.1007/978-3-642-02161-9_1 10.1016/j.phpro.2012.03.363 10.1145/2179298.2179329 10.1109/IDAACS.2013.6662707 10.1016/S1389-1286(00)00136-5 10.1109/CEC.2011.5949798 10.1016/j.asoc.2010.12.003 10.1109/WINCOM.2015.7381338 10.1007/s10586-017-1105-z 10.5120/17550-8146 10.21236/ADA406577 10.1016/j.jnca.2014.03.012 10.1007/s11235-011-9512-6 10.1016/j.eswa.2010.10.088 10.1109/CSSS.2012.202 10.17485/ijst/2010/v3i10.2 10.1016/j.jocs.2018.11.003 10.1109/ITSIM.2010.5561486 10.7148/2013-0061 10.1016/j.engappai.2014.06.022 10.1109/NCCA.2012.29 10.1007/978-3-642-13067-0_69 10.1016/j.jnca.2019.102422 10.1016/j.ins.2011.06.020 10.28945/1088 10.1007/s10844-009-0092-9 10.1007/978-3-642-35813-5_1 10.1016/j.comnet.2019.05.013 10.1007/s10458-005-2631-2 10.1080/19361610.2016.1211847 10.1109/InfoTech.2019.8860895 10.1109/PDGC.2010.5679879 10.1007/978-3-642-12433-4_41 10.5120/1659-2234 10.1109/ROBOT.2004.1307377 10.1109/TSE.1987.232894 10.7815/ijorcs.41.2014.076 10.1145/1315245.1315262 10.1109/ICSE.2003.1201262 10.1016/j.engappai.2014.02.001 10.1007/978-3-642-31217-5_19 10.1007/978-3-642-27609-5_12 10.1109/ICSSD47982.2019.9003119 10.1109/ICCAIRO.2018.00014 10.1007/978-3-642-04091-7_18 10.3166/objet.12.1.9-31 10.5120/1693-2217 10.1007/978-3-642-38865-1_16 10.1002/cpe.1858 10.1016/j.neucom.2011.07.031 10.1049/iet-ifs.2009.0255 10.1007/978-3-642-35208-9_4 10.1007/978-3-642-14306-9_40 10.1109/ISAP.2011.6082170 10.1109/ICTC.2017.8191067 10.26483/ijarcs.v9i1.5328 10.1016/j.patrec.2016.11.018 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2020.3027463 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2169-3536 |
EndPage | 180209 |
ExternalDocumentID | oai_doaj_org_article_48e5b134f645486a92e051ebb87f925d 10_1109_ACCESS_2020_3027463 9207913 |
Genre | orig-research |
GrantInformation_xml | – fundername: Malaysia Research University Network (MRUN) grantid: Vot 4L876 – fundername: Universiti Teknologi Malaysia (UTM) through Research University grantid: Vot-20H04 funderid: 10.13039/501100005417 – fundername: Fundamental Research Grant Scheme (FRGS) through Ministry of Education Malaysia for the Completion of the Research grantid: Vot 5F073 – fundername: SPEV Project, University of Hradec Kralove, FIM, Czech Republic (2020) – fundername: Ph.D. Student Sebastien Mambou in for Consultations Regarding Application Aspects |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c408t-410bf48c54dd5cf543f730292d5e84a6df66fbd0226802e4ca23b59ccfddb9283 |
IEDL.DBID | RIE |
ISSN | 2169-3536 |
IngestDate | Wed Aug 27 01:23:40 EDT 2025 Sun Jun 29 15:40:07 EDT 2025 Thu Apr 24 22:57:27 EDT 2025 Tue Jul 01 02:55:50 EDT 2025 Wed Aug 27 02:30:41 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://creativecommons.org/licenses/by/4.0/legalcode |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c408t-410bf48c54dd5cf543f730292d5e84a6df66fbd0226802e4ca23b59ccfddb9283 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-6467-0124 0000-0003-2000-7915 0000-0001-9746-8459 0000-0002-5992-2574 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/9207913 |
PQID | 2454679920 |
PQPubID | 4845423 |
PageCount | 26 |
ParticipantIDs | ieee_primary_9207913 crossref_primary_10_1109_ACCESS_2020_3027463 doaj_primary_oai_doaj_org_article_48e5b134f645486a92e051ebb87f925d proquest_journals_2454679920 crossref_citationtrail_10_1109_ACCESS_2020_3027463 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20200000 2020-00-00 20200101 2020-01-01 |
PublicationDateYYYYMMDD | 2020-01-01 |
PublicationDate_xml | – year: 2020 text: 20200000 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2020 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref59 ref58 ref53 ref52 ref55 ref54 Peng (ref91) 2011; 460 Bellavista (ref75) 2003 ref50 Saeed (ref30) 2013; 67 ref46 ref42 ref41 ref44 (ref1) 2018 Hussein (ref8) Shamshirband (ref16) 2014 Huailin (ref5) Saeed (ref107) 2013; 15 ref3 ref6 ref100 ref101 ref40 (ref71) 2007 ref35 Sen (ref82) 1999 ref36 ref32 Hancock (ref76) 2011 Pinzón (ref72) 2010; 5 Wegner (ref67) 2012 Kulkarni (ref31) Glavic (ref23) 2006 Yaseen (ref14) 2016; 43 Bajo (ref9) 2010; 6 ref20 Patel (ref37) ref21 ref28 ref29 Hosseinpour (ref7) Kitchenham (ref34) 2007 ref13 ref15 Saxena (ref86) 2018; 10 ref97 ref96 ref11 ref99 ref10 Antzoulatos (ref84) 2014 ref98 ref17 ref18 Sathyanath (ref26) 2002 Huang (ref51); 3 Hosseinpour (ref64) 2013; 7 Malialis (ref66) 2014 ref93 ref92 ref95 ref94 Kabiri (ref27) 2005; 1 ref90 Birrer (ref38) 2010 Das (ref47) 2012; 1 ref85 Ryan (ref102) 2013 ref87 Pataky (ref4) Ou (ref89) ref81 Shuang-Can (ref48) 2014; 8 ref83 Al-Yaseen (ref61) 2015; 2015 ref80 Albag (ref25) 2001 ref79 ref78 ref106 ref104 ref74 ref105 ref77 ref103 Savenko (ref57) 2013; 291 ref2 Preisler (ref69) Danziger (ref19) Dasgupta (ref24); 1 ref70 ref73 Pinzón (ref43) 2012; 1 ref68 Noeparast (ref56) 2014; 3 ref63 Kotenko (ref49) ref65 Kozushko (ref12) 2003 Glavic (ref39) 2006 Sen (ref45) 2010; 2 Wooldridge (ref33) 1998; 1 ref60 Sycara (ref22) 1998; 19 ref62 Lobo (ref88) |
References_xml | – ident: ref32 doi: 10.1016/j.comcom.2014.01.012 – ident: ref2 doi: 10.1109/MC.2002.1012428 – year: 2010 ident: ref38 article-title: Developing a qualia-based multi-agent architecture for use in malware detection – ident: ref83 doi: 10.1007/978-3-642-02161-9_1 – year: 2013 ident: ref102 article-title: A multi agent system for flow-based intrusion detection – volume-title: Executive Summary, 23d Internet Security Threat Report year: 2018 ident: ref1 – ident: ref46 doi: 10.1016/j.phpro.2012.03.363 – ident: ref54 doi: 10.1145/2179298.2179329 – ident: ref50 doi: 10.1109/IDAACS.2013.6662707 – volume-title: Handbook of Mobile Computing year: 2003 ident: ref75 article-title: Security for mobile agents: Issues and challenges – start-page: 223 volume-title: Proc. South Afr. Inf. Secur. Multi-Conf. ident: ref37 article-title: Autonomic agent-based self-managed intrusion detection and prevention system – ident: ref40 doi: 10.1016/S1389-1286(00)00136-5 – ident: ref60 doi: 10.1109/CEC.2011.5949798 – start-page: 118 volume-title: Precision Assembly Technologies and Systems year: 2014 ident: ref84 article-title: A multi-agent system architecture for self-configuration – ident: ref94 doi: 10.1016/j.asoc.2010.12.003 – ident: ref20 doi: 10.1109/WINCOM.2015.7381338 – ident: ref21 doi: 10.1007/s10586-017-1105-z – ident: ref78 doi: 10.5120/17550-8146 – ident: ref98 doi: 10.21236/ADA406577 – ident: ref17 doi: 10.1016/j.jnca.2014.03.012 – ident: ref99 doi: 10.1007/s11235-011-9512-6 – start-page: 21 volume-title: Proc. Conf. Cyber Conflict CCD COE Publications ident: ref49 article-title: Agent-based modeling and simulation of botnets and botnet defense – start-page: 413 volume-title: Proc. 7th Int. Conf. Adapt. Self-Adapt. Syst. Appl. ident: ref69 article-title: Structural adaptations for self-organizing multi-agent systems – ident: ref74 doi: 10.1016/j.eswa.2010.10.088 – ident: ref53 doi: 10.1109/CSSS.2012.202 – ident: ref62 doi: 10.17485/ijst/2010/v3i10.2 – ident: ref85 doi: 10.1016/j.jocs.2018.11.003 – start-page: 1 volume-title: Proc. 7th Int. Conf. Inform. Syst. (INFOS) ident: ref8 article-title: Worm detection using intelligent agents – ident: ref59 doi: 10.1109/ITSIM.2010.5561486 – volume: 19 start-page: 79 issue: 2 year: 1998 ident: ref22 article-title: Multi-agent systems publication-title: AI Mag. – ident: ref95 doi: 10.7148/2013-0061 – volume: 43 start-page: 80 issue: 1 year: 2016 ident: ref14 article-title: Real-time intrusion detection system using multi-agent system publication-title: Int. J. Comput. Sci. – ident: ref52 doi: 10.1016/j.engappai.2014.06.022 – volume: 291 start-page: 171 year: 2013 ident: ref57 article-title: MultiAgent based technique of botnet detection in computer systems publication-title: Mod. Inf. Electron. Technol. – ident: ref77 doi: 10.1109/NCCA.2012.29 – volume: 7 start-page: 206 issue: 9 year: 2013 ident: ref64 article-title: Distributed agent based model for intrusion detection system based on artificial immune system publication-title: Int. J. Digit. Content Technol. Appl. – ident: ref58 doi: 10.1007/978-3-642-13067-0_69 – ident: ref101 doi: 10.1016/j.jnca.2019.102422 – ident: ref73 doi: 10.1016/j.ins.2011.06.020 – year: 2014 ident: ref66 article-title: Distributed reinforcement learning for network intrusion response – ident: ref29 doi: 10.28945/1088 – ident: ref97 doi: 10.1007/s10844-009-0092-9 – volume-title: AISIMAM—An artificial immune system based intelligent multi agent model and its application to a mine detection problem year: 2002 ident: ref26 – volume-title: Int. Conf. Ind. Automat. Comput ident: ref31 article-title: Review of intrusion detection systems (IDS) and agents based IDS – start-page: 151 volume-title: Proc. 2nd Annu. Conf. Genet. Evol. Comput. ident: ref88 article-title: Time complexity of genetic algorithms on exponentially scaled problems – volume: 2 start-page: 128 issue: 2 year: 2010 ident: ref45 article-title: An agent-based intrusion detection system for local area networks publication-title: Int. J. Commun. Netw. Inf. Secur. – volume-title: Network & agent based intrusion detection systems year: 2001 ident: ref25 – volume: 1 start-page: 1 issue: 1 year: 2012 ident: ref47 article-title: A temporal logic based approach to multi-agent intrusion detection and prevention publication-title: Int. J. Commun. Netw. Secur. – ident: ref80 doi: 10.1007/978-3-642-35813-5_1 – start-page: 259 volume-title: Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence year: 1999 ident: ref82 article-title: Learning in multiagent systems – ident: ref104 doi: 10.1016/j.comnet.2019.05.013 – volume: 3 start-page: 3822 issue: 2 year: 2014 ident: ref56 article-title: An immune inspired behavior-based multi-agent model for detecting network clients’ misbehavior publication-title: Int. J. Eng. Comput. Sci. – year: 2007 ident: ref34 article-title: Guidelines for performing systematic literature reviews in software engineering – volume: 3 start-page: V3-141 volume-title: Proc. 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE) ident: ref51 article-title: A multi-agent-based distributed intrusion detection system – ident: ref41 doi: 10.1007/s10458-005-2631-2 – volume: 5 start-page: 455 year: 2010 ident: ref72 article-title: A multi-agent based solution to detect and block DoS threats on Web services publication-title: J. Inf. Assurance Secur. – volume: 1 start-page: 57 issue: 2 year: 2012 ident: ref43 article-title: Detecting DoS attack in Web services by using an adaptive multiagent solution publication-title: Adv. Distrib. Comput. Artif. Intell. J. – ident: ref15 doi: 10.1080/19361610.2016.1211847 – ident: ref92 doi: 10.1109/InfoTech.2019.8860895 – ident: ref44 doi: 10.1109/PDGC.2010.5679879 – ident: ref11 doi: 10.1007/978-3-642-12433-4_41 – ident: ref63 doi: 10.5120/1659-2234 – volume: 8 start-page: 183 issue: 2 year: 2014 ident: ref48 article-title: Multi-agent distributed intrusion detection system model based on BP neural network publication-title: Int. J. Secur. Appl. – year: 2006 ident: ref39 article-title: Agents and multi-agent systems: A short introduction for power engineers – ident: ref96 doi: 10.1109/ROBOT.2004.1307377 – ident: ref3 doi: 10.1109/TSE.1987.232894 – volume: 67 start-page: 25 issue: 16 year: 2013 ident: ref30 article-title: A survey on malware and malware detection systems publication-title: Int. J. Comput. Appl. – ident: ref68 doi: 10.7815/ijorcs.41.2014.076 – ident: ref13 doi: 10.1145/1315245.1315262 – volume: 460 start-page: 433 year: 2011 ident: ref91 article-title: Dynamic distributed information security system based on multi-agent publication-title: Key Eng. Mater. – ident: ref36 doi: 10.1109/ICSE.2003.1201262 – volume: 1 start-page: 147 volume-title: Proc. 22nd Nat. Inf. Syst. Secur. Conf. ident: ref24 article-title: Immunity-based intrusion detection system: A general framework – ident: ref18 doi: 10.1016/j.engappai.2014.02.001 – volume: 6 start-page: 3787 issue: 9 year: 2010 ident: ref9 article-title: A distributed hierarchical multi-agent architecture for blocking attacks to databases publication-title: Int. J. Innov. Comput., Inf. Control – year: 2014 ident: ref16 article-title: Cooperative multi agents for intelligent intrusion detection and prevention systems – volume-title: Understanding Availability, Reliability, and Scalability year: 2007 ident: ref71 – year: 2011 ident: ref76 article-title: A multi agent system for flow-based intrusion detection using reputation and evolutionary computation – volume: 15 start-page: 47 issue: 16 year: 2013 ident: ref107 article-title: Multi-agent architecture with dynamic model checking for malware detection publication-title: Labuan School Informat. Sci. – volume-title: Intrusion Detection: Host-Based and Network-Based Intrusion Detection Systems year: 2003 ident: ref12 – ident: ref105 doi: 10.1007/978-3-642-31217-5_19 – start-page: 115 volume-title: Proc. IEEE Int. Conf. Fuzzy Syst. (FUZZ-IEEE) ident: ref89 article-title: Intrusion detection systems adapted from agent-based artificial immune systems – ident: ref6 doi: 10.1007/978-3-642-27609-5_12 – start-page: 201 volume-title: Proc. 10th Int. Conf. Hybrid Intell. Syst. (HIS) ident: ref19 article-title: A hybrid approach for IEEE 802.11 intrusion detection based on AIS, MAS and naive Bayes – year: 2012 ident: ref67 article-title: Multi-agent malicious behaviour detection – ident: ref79 doi: 10.1109/ICSSD47982.2019.9003119 – ident: ref103 doi: 10.1109/ICCAIRO.2018.00014 – ident: ref28 doi: 10.1007/978-3-642-04091-7_18 – year: 2006 ident: ref23 article-title: Agents and multi-agent systems: A short introduction for power engineers – ident: ref81 doi: 10.3166/objet.12.1.9-31 – start-page: 378 volume-title: Proc. 6th Int. Conf. Adv. Inf. Manage. Service (IMS) ident: ref7 article-title: Design of a new distributed model for intrusion detection system based on artificial immune system – volume: 1 start-page: 71 year: 1998 ident: ref33 article-title: Agent-based computing publication-title: Interoperable Commun. Netw. – ident: ref70 doi: 10.5120/1693-2217 – volume: 1 start-page: 84 issue: 2 year: 2005 ident: ref27 article-title: Research on intrusion detection and response: A survey publication-title: IJ Netw. Secur. – ident: ref65 doi: 10.1007/978-3-642-38865-1_16 – ident: ref100 doi: 10.1002/cpe.1858 – ident: ref90 doi: 10.1016/j.neucom.2011.07.031 – ident: ref106 doi: 10.1049/iet-ifs.2009.0255 – ident: ref42 doi: 10.1007/978-3-642-35208-9_4 – volume: 10 start-page: 17 issue: 3 year: 2018 ident: ref86 article-title: Performance analysis of classification techniques by using multi agent based intrusion detection system publication-title: Int. J. Comput. Netw. Inf. Secur. – volume: 2015 year: 2015 ident: ref61 article-title: Hybrid modified K-means with C4.5 for intrusion detection systems in multiagent systems publication-title: Sci. World J. – start-page: 182 volume-title: Proc. IEEE Int. Conf. Comput. Sci. Automat. Eng. ident: ref5 article-title: Research on adaptive distributed intrusion detection system model based on multi-agent – ident: ref55 doi: 10.1007/978-3-642-14306-9_40 – ident: ref10 doi: 10.1109/ISAP.2011.6082170 – ident: ref87 doi: 10.1109/ICTC.2017.8191067 – ident: ref93 doi: 10.26483/ijarcs.v9i1.5328 – start-page: 184 volume-title: Proc. Int. Workshop Concurrency, Specification Program. ident: ref4 article-title: Multi-agent heterogeneous intrusion detection system – ident: ref35 doi: 10.1016/j.patrec.2016.11.018 |
SSID | ssj0000816957 |
Score | 2.1967053 |
Snippet | Multi-agent architectures have been successful in attaining considerable attention among computer security researchers. This is so, because of their... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 180184 |
SubjectTerms | attacks Bibliographies Computer architecture Computer networks Computer security cyberphysical system Cybersecurity Empirical analysis Fault tolerance IDS architectures Intrusion detection Knowledge bases (artificial intelligence) Learning Literature reviews malware Multi-agent Multiagent systems Questions Response time review Security systems Systematics |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQJxgQUBCFgjwwYjVxbMceS6FqGVigUjcr_ppQikT_vzg7blSEBAtrZF_iu7PvnmO_Q-iO8eDi_yUivAiE2cYQRYMgPjgJgEOG2iW2zxexWLHnNV_vlfqKZ8I6euBOcRMmPTdlxUKknpKiUdSDH3ljZB0U5S6uvhDz9sBUWoNlKRSvM81QWajJdDaDEQEgpIBTIxYT1bdQlBj7c4mVH-tyCjbzE3Scs0Q87b7uFB349gwd7XEHDtFyil97FmacckayCQTyOQLd8I5sBG8CTpdsyTReosLLNt6yAGPgR79Nx7Dac7SaP73NFiTXRSCWFXJLWFmYwKTlzDluA2dVgHlKFXXcS9YIF4QIxkF0FrKgHgxAK8OVtcE5oyCfuECDdtP6S4StrCyvXOTxayJNoQLjNB6iOER1gE58hOhORdpm0vBYu-JdJ_BQKN3pVUe96qzXEbrvO310nBm_N3-Iuu-bRsLr9ADcQGc30H-5wQgNo-V6IYoWtSpB9nhnSZ0n56emIELUCppc_cerr9FhHE63LzNGAzCjv4FMZWtuk1N-ASCn384 priority: 102 providerName: Directory of Open Access Journals |
Title | A Systematic State-of-the-Art Analysis of Multi-Agent Intrusion Detection |
URI | https://ieeexplore.ieee.org/document/9207913 https://www.proquest.com/docview/2454679920 https://doaj.org/article/48e5b134f645486a92e051ebb87f925d |
Volume | 8 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB5RTnAoLRR1KUU-9IiXrGM79nG7LYJK5UKRuFnx69Iqi8Ry6a_vjOON-lLVWxTZ1iSfH_PZnm8A3kmVI50vcZ105jL0nluRNU85GiQcJnexqH3e6Ks7-ele3e_A-RQLk1Iql8_SnB7LWX5chyfaKruwoukspah9hsRtjNWa9lMogYRVXRUWWjT2Yrla4TcgBRTITIl96faXxado9NekKn_MxGV5uTyAz1vDxlslX-dPGz8P33_TbPxfy1_A8-pnsuXYMV7CThoOYf8n9cEjuF6y20nHmRWvk68zR4-QYzW2lSth68xKmC5fUhgWux4oTgPhZB_SplzkGl7B3eXHL6srXjMr8CAbs-Fy0fgsTVAyRhWykm3GkS6siCoZ2euYtc4-4vquTSMSQihar2wIOUZv0SM5ht1hPaTXwIJpg2ojKQH2JHRoEd4-oR-AfgGSLzUDsf3lLlTZccp-8c0V-tFYN-LkCCdXcZrB-VTpYVTd-Hfx94TlVJQks8sLxMDVEeikScovWplJw8zo3oqEE1Ly3nQZ7Y4zOCLcpkYqZDM43fYMV4f3oxPYhO4sFjn5e603sEcGjns1p7CLwKS36L1s_Flh_Wel8_4Au3nqyw |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB5V7QE49EFBLH35wLHeZh3bsY_bpdUutL3QSr1Z8etSlEVie-mvZ-x4o1IQ4hZFHmuSz_bM2J5vAD5xEX06X6IyyEi5ay3VLEoaolcYcKjY-Mz2eSPnd_zLvbjfgNMhFyaEkC-fhXF6zGf5fuke01bZmWZVo1OJ2i20-2LSZ2sNOyqphIQWTaEWmlT6bDqb4VdgEMgwNk3xl6x_Mz-Zpb-UVfljLc4G5nIHrteq9fdKHsaPKzt2Ty9YG_9X913YLp4mmfZDYw82QvcW3jzjH9yHxZR8G5icSfY76TJS9AkpipE1YQlZRpITdek0JWKRRZcyNRBQ8jms8lWu7h3cXV7czua01FagjldqRfmkspErJ7j3wkXB64hznWnmRVC8lT5KGa1HCy9VxQKCyGortHPRe6vRJ3kPm92yCx-AOFU7UfvEBdgmqkONALcBPQH0DDD8EiNg619uXCEeT_UvvpscgFTa9DiZhJMpOI3gdBD60fNu_Lv5ecJyaJpIs_MLxMCUOWi4CsJOah4Ti5mSrWYBl6RgrWoi6u1HsJ9wGzopkI3gcD0yTJngPw3DLmSjscnHv0udwKv57fWVuVrcfD2A10nZfufmEDYRpHCEvszKHuch_AuY-u0f |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Systematic+State-of-the-Art+Analysis+of+Multi-Agent+Intrusion+Detection&rft.jtitle=IEEE+access&rft.au=Saeed%2C+Imtithal+A.&rft.au=Selamat%2C+Ali&rft.au=Rohani%2C+Mohd+Foad&rft.au=Krejcar%2C+Ondrej&rft.date=2020&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=8&rft.spage=180184&rft.epage=180209&rft_id=info:doi/10.1109%2FACCESS.2020.3027463&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2020_3027463 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |