A Systematic State-of-the-Art Analysis of Multi-Agent Intrusion Detection

Multi-agent architectures have been successful in attaining considerable attention among computer security researchers. This is so, because of their demonstrated capabilities such as autonomy, embedded intelligence, learning and self-growing knowledge-base, high scalability, fault tolerance, and aut...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 8; pp. 180184 - 180209
Main Authors Saeed, Imtithal A., Selamat, Ali, Rohani, Mohd Foad, Krejcar, Ondrej, Chaudhry, Junaid Ahsenali
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Multi-agent architectures have been successful in attaining considerable attention among computer security researchers. This is so, because of their demonstrated capabilities such as autonomy, embedded intelligence, learning and self-growing knowledge-base, high scalability, fault tolerance, and automatic parallelism. These characteristics have made this technology a de facto standard for developing ambient security systems to meet the open and dynamic nature of today's online communities. Although multi-agent architectures are increasingly studied in the area of computer security, there is still not enough empirical evidence on their performance in intrusions and attacks detection. The aim of this paper is to report the systematic literature review conducted in the context of specific research questions, to investigate multi-agent IDS architectures to highlight the issues that affect their performance in terms of detection accuracy and response time. We used pertinent keywords and terms to search and retrieve the most recent research studies, on multi-agent IDS architectures, from the major research databases and digital libraries such as SCOPUS, Springer, and IEEE Explore. The search processes resulted in a number of studies; among them, there were journal articles, book chapters, conference papers, dissertations, and theses. The obtained studies were assessed and filtered out, and finally, there were over 71 studies chosen to answer the research questions. The results of this study have shown that multi-agent architectures include several advantages that can help in the development of ambient IDS. However, it has been found that there are several issues in the current multi-agent IDS architectures that may degrade the accuracy and response time of intrusions and attacks detection. Based on our findings, the issues of multi-agent IDS architectures include limitations in the techniques, mechanisms, and schemes used for multi-agent IDS adaptation and learning, load balancing, scalability, fault-tolerance, and high communication overhead. It has also been found that new measurement metrics are required for evaluating multi-agent IDS architectures.
AbstractList Multi-agent architectures have been successful in attaining considerable attention among computer security researchers. This is so, because of their demonstrated capabilities such as autonomy, embedded intelligence, learning and self-growing knowledge-base, high scalability, fault tolerance, and automatic parallelism. These characteristics have made this technology a de facto standard for developing ambient security systems to meet the open and dynamic nature of today’s online communities. Although multi-agent architectures are increasingly studied in the area of computer security, there is still not enough empirical evidence on their performance in intrusions and attacks detection. The aim of this paper is to report the systematic literature review conducted in the context of specific research questions, to investigate multi-agent IDS architectures to highlight the issues that affect their performance in terms of detection accuracy and response time. We used pertinent keywords and terms to search and retrieve the most recent research studies, on multi-agent IDS architectures, from the major research databases and digital libraries such as SCOPUS, Springer, and IEEE Explore. The search processes resulted in a number of studies; among them, there were journal articles, book chapters, conference papers, dissertations, and theses. The obtained studies were assessed and filtered out, and finally, there were over 71 studies chosen to answer the research questions. The results of this study have shown that multi-agent architectures include several advantages that can help in the development of ambient IDS. However, it has been found that there are several issues in the current multi-agent IDS architectures that may degrade the accuracy and response time of intrusions and attacks detection. Based on our findings, the issues of multi-agent IDS architectures include limitations in the techniques, mechanisms, and schemes used for multi-agent IDS adaptation and learning, load balancing, scalability, fault-tolerance, and high communication overhead. It has also been found that new measurement metrics are required for evaluating multi-agent IDS architectures.
Author Saeed, Imtithal A.
Rohani, Mohd Foad
Selamat, Ali
Chaudhry, Junaid Ahsenali
Krejcar, Ondrej
Author_xml – sequence: 1
  givenname: Imtithal A.
  orcidid: 0000-0001-6467-0124
  surname: Saeed
  fullname: Saeed, Imtithal A.
  organization: School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia UTM, Skudai, Malaysia
– sequence: 2
  givenname: Ali
  orcidid: 0000-0001-9746-8459
  surname: Selamat
  fullname: Selamat, Ali
  email: aselamat@utm.my
  organization: School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia UTM, Skudai, Malaysia
– sequence: 3
  givenname: Mohd Foad
  surname: Rohani
  fullname: Rohani, Mohd Foad
  organization: School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia UTM, Skudai, Malaysia
– sequence: 4
  givenname: Ondrej
  orcidid: 0000-0002-5992-2574
  surname: Krejcar
  fullname: Krejcar, Ondrej
  organization: Center for Basic and Applied Research, Faculty of Informatics and Management, University of Hradec Kralove, Hradec Kralove, Czech Republic
– sequence: 5
  givenname: Junaid Ahsenali
  orcidid: 0000-0003-2000-7915
  surname: Chaudhry
  fullname: Chaudhry, Junaid Ahsenali
  organization: Duja Inc., Perth, WA, Australia
BookMark eNp9kU9v1DAQxS3USpS2n6CXSJyz9f_Yx2gpsFIRh4Wz5djj4lUaF9t72G-PS1qEOOCLR6P5jd6b9w6dLWkBhG4I3hCC9e243d7t9xuKKd4wTAcu2Rt0QYnUPRNMnv1Vv0XXpRxwe6q1xHCBdmO3P5UKj7ZG1-2rrdCn0Ncf0I-5duNi51OJpUuh-3Kca-zHB1hqt1tqPpaYlu4DVHC1VVfoPNi5wPXLf4m-f7z7tv3c33_9tNuO973jWNWeEzwFrpzg3gsXBGdhaKo19QIUt9IHKcPkMaVSYQrcWcomoZ0L3k-aKnaJduten-zBPOX4aPPJJBvN70bKD8bmZmYGwxWIiTAeJBdcSaspYEFgmtQQNBW-7Xq_7nrK6ecRSjWHdMzNczG0IXLQmuI2pdcpl1MpGYJxsR2qea7ZxtkQbJ6DMGsQ5jkI8xJEY9k_7Kvi_1M3KxUB4A_RtAyaMPYLkMGUng
CODEN IAECCG
CitedBy_id crossref_primary_10_3390_electronics10233016
crossref_primary_10_3390_electronics10212711
crossref_primary_10_1109_TNNLS_2021_3121870
crossref_primary_10_1016_j_cose_2024_103871
crossref_primary_10_3390_s23031283
Cites_doi 10.1016/j.comcom.2014.01.012
10.1109/MC.2002.1012428
10.1007/978-3-642-02161-9_1
10.1016/j.phpro.2012.03.363
10.1145/2179298.2179329
10.1109/IDAACS.2013.6662707
10.1016/S1389-1286(00)00136-5
10.1109/CEC.2011.5949798
10.1016/j.asoc.2010.12.003
10.1109/WINCOM.2015.7381338
10.1007/s10586-017-1105-z
10.5120/17550-8146
10.21236/ADA406577
10.1016/j.jnca.2014.03.012
10.1007/s11235-011-9512-6
10.1016/j.eswa.2010.10.088
10.1109/CSSS.2012.202
10.17485/ijst/2010/v3i10.2
10.1016/j.jocs.2018.11.003
10.1109/ITSIM.2010.5561486
10.7148/2013-0061
10.1016/j.engappai.2014.06.022
10.1109/NCCA.2012.29
10.1007/978-3-642-13067-0_69
10.1016/j.jnca.2019.102422
10.1016/j.ins.2011.06.020
10.28945/1088
10.1007/s10844-009-0092-9
10.1007/978-3-642-35813-5_1
10.1016/j.comnet.2019.05.013
10.1007/s10458-005-2631-2
10.1080/19361610.2016.1211847
10.1109/InfoTech.2019.8860895
10.1109/PDGC.2010.5679879
10.1007/978-3-642-12433-4_41
10.5120/1659-2234
10.1109/ROBOT.2004.1307377
10.1109/TSE.1987.232894
10.7815/ijorcs.41.2014.076
10.1145/1315245.1315262
10.1109/ICSE.2003.1201262
10.1016/j.engappai.2014.02.001
10.1007/978-3-642-31217-5_19
10.1007/978-3-642-27609-5_12
10.1109/ICSSD47982.2019.9003119
10.1109/ICCAIRO.2018.00014
10.1007/978-3-642-04091-7_18
10.3166/objet.12.1.9-31
10.5120/1693-2217
10.1007/978-3-642-38865-1_16
10.1002/cpe.1858
10.1016/j.neucom.2011.07.031
10.1049/iet-ifs.2009.0255
10.1007/978-3-642-35208-9_4
10.1007/978-3-642-14306-9_40
10.1109/ISAP.2011.6082170
10.1109/ICTC.2017.8191067
10.26483/ijarcs.v9i1.5328
10.1016/j.patrec.2016.11.018
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
DOA
DOI 10.1109/ACCESS.2020.3027463
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList Materials Research Database


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 180209
ExternalDocumentID oai_doaj_org_article_48e5b134f645486a92e051ebb87f925d
10_1109_ACCESS_2020_3027463
9207913
Genre orig-research
GrantInformation_xml – fundername: Malaysia Research University Network (MRUN)
  grantid: Vot 4L876
– fundername: Universiti Teknologi Malaysia (UTM) through Research University
  grantid: Vot-20H04
  funderid: 10.13039/501100005417
– fundername: Fundamental Research Grant Scheme (FRGS) through Ministry of Education Malaysia for the Completion of the Research
  grantid: Vot 5F073
– fundername: SPEV Project, University of Hradec Kralove, FIM, Czech Republic (2020)
– fundername: Ph.D. Student Sebastien Mambou in for Consultations Regarding Application Aspects
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
AGSQL
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c408t-410bf48c54dd5cf543f730292d5e84a6df66fbd0226802e4ca23b59ccfddb9283
IEDL.DBID RIE
ISSN 2169-3536
IngestDate Wed Aug 27 01:23:40 EDT 2025
Sun Jun 29 15:40:07 EDT 2025
Thu Apr 24 22:57:27 EDT 2025
Tue Jul 01 02:55:50 EDT 2025
Wed Aug 27 02:30:41 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licenses/by/4.0/legalcode
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-410bf48c54dd5cf543f730292d5e84a6df66fbd0226802e4ca23b59ccfddb9283
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-6467-0124
0000-0003-2000-7915
0000-0001-9746-8459
0000-0002-5992-2574
OpenAccessLink https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/9207913
PQID 2454679920
PQPubID 4845423
PageCount 26
ParticipantIDs ieee_primary_9207913
crossref_primary_10_1109_ACCESS_2020_3027463
doaj_primary_oai_doaj_org_article_48e5b134f645486a92e051ebb87f925d
proquest_journals_2454679920
crossref_citationtrail_10_1109_ACCESS_2020_3027463
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20200000
2020-00-00
20200101
2020-01-01
PublicationDateYYYYMMDD 2020-01-01
PublicationDate_xml – year: 2020
  text: 20200000
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2020
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref59
ref58
ref53
ref52
ref55
ref54
Peng (ref91) 2011; 460
Bellavista (ref75) 2003
ref50
Saeed (ref30) 2013; 67
ref46
ref42
ref41
ref44
(ref1) 2018
Hussein (ref8)
Shamshirband (ref16) 2014
Huailin (ref5)
Saeed (ref107) 2013; 15
ref3
ref6
ref100
ref101
ref40
(ref71) 2007
ref35
Sen (ref82) 1999
ref36
ref32
Hancock (ref76) 2011
Pinzón (ref72) 2010; 5
Wegner (ref67) 2012
Kulkarni (ref31)
Glavic (ref23) 2006
Yaseen (ref14) 2016; 43
Bajo (ref9) 2010; 6
ref20
Patel (ref37)
ref21
ref28
ref29
Hosseinpour (ref7)
Kitchenham (ref34) 2007
ref13
ref15
Saxena (ref86) 2018; 10
ref97
ref96
ref11
ref99
ref10
Antzoulatos (ref84) 2014
ref98
ref17
ref18
Sathyanath (ref26) 2002
Huang (ref51); 3
Hosseinpour (ref64) 2013; 7
Malialis (ref66) 2014
ref93
ref92
ref95
ref94
Kabiri (ref27) 2005; 1
ref90
Birrer (ref38) 2010
Das (ref47) 2012; 1
ref85
Ryan (ref102) 2013
ref87
Pataky (ref4)
Ou (ref89)
ref81
Shuang-Can (ref48) 2014; 8
ref83
Al-Yaseen (ref61) 2015; 2015
ref80
Albag (ref25) 2001
ref79
ref78
ref106
ref104
ref74
ref105
ref77
ref103
Savenko (ref57) 2013; 291
ref2
Preisler (ref69)
Danziger (ref19)
Dasgupta (ref24); 1
ref70
ref73
Pinzón (ref43) 2012; 1
ref68
Noeparast (ref56) 2014; 3
ref63
Kotenko (ref49)
ref65
Kozushko (ref12) 2003
Glavic (ref39) 2006
Sen (ref45) 2010; 2
Wooldridge (ref33) 1998; 1
ref60
Sycara (ref22) 1998; 19
ref62
Lobo (ref88)
References_xml – ident: ref32
  doi: 10.1016/j.comcom.2014.01.012
– ident: ref2
  doi: 10.1109/MC.2002.1012428
– year: 2010
  ident: ref38
  article-title: Developing a qualia-based multi-agent architecture for use in malware detection
– ident: ref83
  doi: 10.1007/978-3-642-02161-9_1
– year: 2013
  ident: ref102
  article-title: A multi agent system for flow-based intrusion detection
– volume-title: Executive Summary, 23d Internet Security Threat Report
  year: 2018
  ident: ref1
– ident: ref46
  doi: 10.1016/j.phpro.2012.03.363
– ident: ref54
  doi: 10.1145/2179298.2179329
– ident: ref50
  doi: 10.1109/IDAACS.2013.6662707
– volume-title: Handbook of Mobile Computing
  year: 2003
  ident: ref75
  article-title: Security for mobile agents: Issues and challenges
– start-page: 223
  volume-title: Proc. South Afr. Inf. Secur. Multi-Conf.
  ident: ref37
  article-title: Autonomic agent-based self-managed intrusion detection and prevention system
– ident: ref40
  doi: 10.1016/S1389-1286(00)00136-5
– ident: ref60
  doi: 10.1109/CEC.2011.5949798
– start-page: 118
  volume-title: Precision Assembly Technologies and Systems
  year: 2014
  ident: ref84
  article-title: A multi-agent system architecture for self-configuration
– ident: ref94
  doi: 10.1016/j.asoc.2010.12.003
– ident: ref20
  doi: 10.1109/WINCOM.2015.7381338
– ident: ref21
  doi: 10.1007/s10586-017-1105-z
– ident: ref78
  doi: 10.5120/17550-8146
– ident: ref98
  doi: 10.21236/ADA406577
– ident: ref17
  doi: 10.1016/j.jnca.2014.03.012
– ident: ref99
  doi: 10.1007/s11235-011-9512-6
– start-page: 21
  volume-title: Proc. Conf. Cyber Conflict CCD COE Publications
  ident: ref49
  article-title: Agent-based modeling and simulation of botnets and botnet defense
– start-page: 413
  volume-title: Proc. 7th Int. Conf. Adapt. Self-Adapt. Syst. Appl.
  ident: ref69
  article-title: Structural adaptations for self-organizing multi-agent systems
– ident: ref74
  doi: 10.1016/j.eswa.2010.10.088
– ident: ref53
  doi: 10.1109/CSSS.2012.202
– ident: ref62
  doi: 10.17485/ijst/2010/v3i10.2
– ident: ref85
  doi: 10.1016/j.jocs.2018.11.003
– start-page: 1
  volume-title: Proc. 7th Int. Conf. Inform. Syst. (INFOS)
  ident: ref8
  article-title: Worm detection using intelligent agents
– ident: ref59
  doi: 10.1109/ITSIM.2010.5561486
– volume: 19
  start-page: 79
  issue: 2
  year: 1998
  ident: ref22
  article-title: Multi-agent systems
  publication-title: AI Mag.
– ident: ref95
  doi: 10.7148/2013-0061
– volume: 43
  start-page: 80
  issue: 1
  year: 2016
  ident: ref14
  article-title: Real-time intrusion detection system using multi-agent system
  publication-title: Int. J. Comput. Sci.
– ident: ref52
  doi: 10.1016/j.engappai.2014.06.022
– volume: 291
  start-page: 171
  year: 2013
  ident: ref57
  article-title: MultiAgent based technique of botnet detection in computer systems
  publication-title: Mod. Inf. Electron. Technol.
– ident: ref77
  doi: 10.1109/NCCA.2012.29
– volume: 7
  start-page: 206
  issue: 9
  year: 2013
  ident: ref64
  article-title: Distributed agent based model for intrusion detection system based on artificial immune system
  publication-title: Int. J. Digit. Content Technol. Appl.
– ident: ref58
  doi: 10.1007/978-3-642-13067-0_69
– ident: ref101
  doi: 10.1016/j.jnca.2019.102422
– ident: ref73
  doi: 10.1016/j.ins.2011.06.020
– year: 2014
  ident: ref66
  article-title: Distributed reinforcement learning for network intrusion response
– ident: ref29
  doi: 10.28945/1088
– ident: ref97
  doi: 10.1007/s10844-009-0092-9
– volume-title: AISIMAM—An artificial immune system based intelligent multi agent model and its application to a mine detection problem
  year: 2002
  ident: ref26
– volume-title: Int. Conf. Ind. Automat. Comput
  ident: ref31
  article-title: Review of intrusion detection systems (IDS) and agents based IDS
– start-page: 151
  volume-title: Proc. 2nd Annu. Conf. Genet. Evol. Comput.
  ident: ref88
  article-title: Time complexity of genetic algorithms on exponentially scaled problems
– volume: 2
  start-page: 128
  issue: 2
  year: 2010
  ident: ref45
  article-title: An agent-based intrusion detection system for local area networks
  publication-title: Int. J. Commun. Netw. Inf. Secur.
– volume-title: Network & agent based intrusion detection systems
  year: 2001
  ident: ref25
– volume: 1
  start-page: 1
  issue: 1
  year: 2012
  ident: ref47
  article-title: A temporal logic based approach to multi-agent intrusion detection and prevention
  publication-title: Int. J. Commun. Netw. Secur.
– ident: ref80
  doi: 10.1007/978-3-642-35813-5_1
– start-page: 259
  volume-title: Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence
  year: 1999
  ident: ref82
  article-title: Learning in multiagent systems
– ident: ref104
  doi: 10.1016/j.comnet.2019.05.013
– volume: 3
  start-page: 3822
  issue: 2
  year: 2014
  ident: ref56
  article-title: An immune inspired behavior-based multi-agent model for detecting network clients’ misbehavior
  publication-title: Int. J. Eng. Comput. Sci.
– year: 2007
  ident: ref34
  article-title: Guidelines for performing systematic literature reviews in software engineering
– volume: 3
  start-page: V3-141
  volume-title: Proc. 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE)
  ident: ref51
  article-title: A multi-agent-based distributed intrusion detection system
– ident: ref41
  doi: 10.1007/s10458-005-2631-2
– volume: 5
  start-page: 455
  year: 2010
  ident: ref72
  article-title: A multi-agent based solution to detect and block DoS threats on Web services
  publication-title: J. Inf. Assurance Secur.
– volume: 1
  start-page: 57
  issue: 2
  year: 2012
  ident: ref43
  article-title: Detecting DoS attack in Web services by using an adaptive multiagent solution
  publication-title: Adv. Distrib. Comput. Artif. Intell. J.
– ident: ref15
  doi: 10.1080/19361610.2016.1211847
– ident: ref92
  doi: 10.1109/InfoTech.2019.8860895
– ident: ref44
  doi: 10.1109/PDGC.2010.5679879
– ident: ref11
  doi: 10.1007/978-3-642-12433-4_41
– ident: ref63
  doi: 10.5120/1659-2234
– volume: 8
  start-page: 183
  issue: 2
  year: 2014
  ident: ref48
  article-title: Multi-agent distributed intrusion detection system model based on BP neural network
  publication-title: Int. J. Secur. Appl.
– year: 2006
  ident: ref39
  article-title: Agents and multi-agent systems: A short introduction for power engineers
– ident: ref96
  doi: 10.1109/ROBOT.2004.1307377
– ident: ref3
  doi: 10.1109/TSE.1987.232894
– volume: 67
  start-page: 25
  issue: 16
  year: 2013
  ident: ref30
  article-title: A survey on malware and malware detection systems
  publication-title: Int. J. Comput. Appl.
– ident: ref68
  doi: 10.7815/ijorcs.41.2014.076
– ident: ref13
  doi: 10.1145/1315245.1315262
– volume: 460
  start-page: 433
  year: 2011
  ident: ref91
  article-title: Dynamic distributed information security system based on multi-agent
  publication-title: Key Eng. Mater.
– ident: ref36
  doi: 10.1109/ICSE.2003.1201262
– volume: 1
  start-page: 147
  volume-title: Proc. 22nd Nat. Inf. Syst. Secur. Conf.
  ident: ref24
  article-title: Immunity-based intrusion detection system: A general framework
– ident: ref18
  doi: 10.1016/j.engappai.2014.02.001
– volume: 6
  start-page: 3787
  issue: 9
  year: 2010
  ident: ref9
  article-title: A distributed hierarchical multi-agent architecture for blocking attacks to databases
  publication-title: Int. J. Innov. Comput., Inf. Control
– year: 2014
  ident: ref16
  article-title: Cooperative multi agents for intelligent intrusion detection and prevention systems
– volume-title: Understanding Availability, Reliability, and Scalability
  year: 2007
  ident: ref71
– year: 2011
  ident: ref76
  article-title: A multi agent system for flow-based intrusion detection using reputation and evolutionary computation
– volume: 15
  start-page: 47
  issue: 16
  year: 2013
  ident: ref107
  article-title: Multi-agent architecture with dynamic model checking for malware detection
  publication-title: Labuan School Informat. Sci.
– volume-title: Intrusion Detection: Host-Based and Network-Based Intrusion Detection Systems
  year: 2003
  ident: ref12
– ident: ref105
  doi: 10.1007/978-3-642-31217-5_19
– start-page: 115
  volume-title: Proc. IEEE Int. Conf. Fuzzy Syst. (FUZZ-IEEE)
  ident: ref89
  article-title: Intrusion detection systems adapted from agent-based artificial immune systems
– ident: ref6
  doi: 10.1007/978-3-642-27609-5_12
– start-page: 201
  volume-title: Proc. 10th Int. Conf. Hybrid Intell. Syst. (HIS)
  ident: ref19
  article-title: A hybrid approach for IEEE 802.11 intrusion detection based on AIS, MAS and naive Bayes
– year: 2012
  ident: ref67
  article-title: Multi-agent malicious behaviour detection
– ident: ref79
  doi: 10.1109/ICSSD47982.2019.9003119
– ident: ref103
  doi: 10.1109/ICCAIRO.2018.00014
– ident: ref28
  doi: 10.1007/978-3-642-04091-7_18
– year: 2006
  ident: ref23
  article-title: Agents and multi-agent systems: A short introduction for power engineers
– ident: ref81
  doi: 10.3166/objet.12.1.9-31
– start-page: 378
  volume-title: Proc. 6th Int. Conf. Adv. Inf. Manage. Service (IMS)
  ident: ref7
  article-title: Design of a new distributed model for intrusion detection system based on artificial immune system
– volume: 1
  start-page: 71
  year: 1998
  ident: ref33
  article-title: Agent-based computing
  publication-title: Interoperable Commun. Netw.
– ident: ref70
  doi: 10.5120/1693-2217
– volume: 1
  start-page: 84
  issue: 2
  year: 2005
  ident: ref27
  article-title: Research on intrusion detection and response: A survey
  publication-title: IJ Netw. Secur.
– ident: ref65
  doi: 10.1007/978-3-642-38865-1_16
– ident: ref100
  doi: 10.1002/cpe.1858
– ident: ref90
  doi: 10.1016/j.neucom.2011.07.031
– ident: ref106
  doi: 10.1049/iet-ifs.2009.0255
– ident: ref42
  doi: 10.1007/978-3-642-35208-9_4
– volume: 10
  start-page: 17
  issue: 3
  year: 2018
  ident: ref86
  article-title: Performance analysis of classification techniques by using multi agent based intrusion detection system
  publication-title: Int. J. Comput. Netw. Inf. Secur.
– volume: 2015
  year: 2015
  ident: ref61
  article-title: Hybrid modified K-means with C4.5 for intrusion detection systems in multiagent systems
  publication-title: Sci. World J.
– start-page: 182
  volume-title: Proc. IEEE Int. Conf. Comput. Sci. Automat. Eng.
  ident: ref5
  article-title: Research on adaptive distributed intrusion detection system model based on multi-agent
– ident: ref55
  doi: 10.1007/978-3-642-14306-9_40
– ident: ref10
  doi: 10.1109/ISAP.2011.6082170
– ident: ref87
  doi: 10.1109/ICTC.2017.8191067
– ident: ref93
  doi: 10.26483/ijarcs.v9i1.5328
– start-page: 184
  volume-title: Proc. Int. Workshop Concurrency, Specification Program.
  ident: ref4
  article-title: Multi-agent heterogeneous intrusion detection system
– ident: ref35
  doi: 10.1016/j.patrec.2016.11.018
SSID ssj0000816957
Score 2.1967053
Snippet Multi-agent architectures have been successful in attaining considerable attention among computer security researchers. This is so, because of their...
SourceID doaj
proquest
crossref
ieee
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 180184
SubjectTerms attacks
Bibliographies
Computer architecture
Computer networks
Computer security
cyberphysical system
Cybersecurity
Empirical analysis
Fault tolerance
IDS architectures
Intrusion detection
Knowledge bases (artificial intelligence)
Learning
Literature reviews
malware
Multi-agent
Multiagent systems
Questions
Response time
review
Security systems
Systematics
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQJxgQUBCFgjwwYjVxbMceS6FqGVigUjcr_ppQikT_vzg7blSEBAtrZF_iu7PvnmO_Q-iO8eDi_yUivAiE2cYQRYMgPjgJgEOG2iW2zxexWLHnNV_vlfqKZ8I6euBOcRMmPTdlxUKknpKiUdSDH3ljZB0U5S6uvhDz9sBUWoNlKRSvM81QWajJdDaDEQEgpIBTIxYT1bdQlBj7c4mVH-tyCjbzE3Scs0Q87b7uFB349gwd7XEHDtFyil97FmacckayCQTyOQLd8I5sBG8CTpdsyTReosLLNt6yAGPgR79Nx7Dac7SaP73NFiTXRSCWFXJLWFmYwKTlzDluA2dVgHlKFXXcS9YIF4QIxkF0FrKgHgxAK8OVtcE5oyCfuECDdtP6S4StrCyvXOTxayJNoQLjNB6iOER1gE58hOhORdpm0vBYu-JdJ_BQKN3pVUe96qzXEbrvO310nBm_N3-Iuu-bRsLr9ADcQGc30H-5wQgNo-V6IYoWtSpB9nhnSZ0n56emIELUCppc_cerr9FhHE63LzNGAzCjv4FMZWtuk1N-ASCn384
  priority: 102
  providerName: Directory of Open Access Journals
Title A Systematic State-of-the-Art Analysis of Multi-Agent Intrusion Detection
URI https://ieeexplore.ieee.org/document/9207913
https://www.proquest.com/docview/2454679920
https://doaj.org/article/48e5b134f645486a92e051ebb87f925d
Volume 8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB5RTnAoLRR1KUU-9IiXrGM79nG7LYJK5UKRuFnx69Iqi8Ry6a_vjOON-lLVWxTZ1iSfH_PZnm8A3kmVI50vcZ105jL0nluRNU85GiQcJnexqH3e6Ks7-ele3e_A-RQLk1Iql8_SnB7LWX5chyfaKruwoukspah9hsRtjNWa9lMogYRVXRUWWjT2Yrla4TcgBRTITIl96faXxado9NekKn_MxGV5uTyAz1vDxlslX-dPGz8P33_TbPxfy1_A8-pnsuXYMV7CThoOYf8n9cEjuF6y20nHmRWvk68zR4-QYzW2lSth68xKmC5fUhgWux4oTgPhZB_SplzkGl7B3eXHL6srXjMr8CAbs-Fy0fgsTVAyRhWykm3GkS6siCoZ2euYtc4-4vquTSMSQihar2wIOUZv0SM5ht1hPaTXwIJpg2ojKQH2JHRoEd4-oR-AfgGSLzUDsf3lLlTZccp-8c0V-tFYN-LkCCdXcZrB-VTpYVTd-Hfx94TlVJQks8sLxMDVEeikScovWplJw8zo3oqEE1Ly3nQZ7Y4zOCLcpkYqZDM43fYMV4f3oxPYhO4sFjn5e603sEcGjns1p7CLwKS36L1s_Flh_Wel8_4Au3nqyw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB5V7QE49EFBLH35wLHeZh3bsY_bpdUutL3QSr1Z8etSlEVie-mvZ-x4o1IQ4hZFHmuSz_bM2J5vAD5xEX06X6IyyEi5ay3VLEoaolcYcKjY-Mz2eSPnd_zLvbjfgNMhFyaEkC-fhXF6zGf5fuke01bZmWZVo1OJ2i20-2LSZ2sNOyqphIQWTaEWmlT6bDqb4VdgEMgwNk3xl6x_Mz-Zpb-UVfljLc4G5nIHrteq9fdKHsaPKzt2Ty9YG_9X913YLp4mmfZDYw82QvcW3jzjH9yHxZR8G5icSfY76TJS9AkpipE1YQlZRpITdek0JWKRRZcyNRBQ8jms8lWu7h3cXV7czua01FagjldqRfmkspErJ7j3wkXB64hznWnmRVC8lT5KGa1HCy9VxQKCyGortHPRe6vRJ3kPm92yCx-AOFU7UfvEBdgmqkONALcBPQH0DDD8EiNg619uXCEeT_UvvpscgFTa9DiZhJMpOI3gdBD60fNu_Lv5ecJyaJpIs_MLxMCUOWi4CsJOah4Ti5mSrWYBl6RgrWoi6u1HsJ9wGzopkI3gcD0yTJngPw3DLmSjscnHv0udwKv57fWVuVrcfD2A10nZfufmEDYRpHCEvszKHuch_AuY-u0f
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Systematic+State-of-the-Art+Analysis+of+Multi-Agent+Intrusion+Detection&rft.jtitle=IEEE+access&rft.au=Saeed%2C+Imtithal+A.&rft.au=Selamat%2C+Ali&rft.au=Rohani%2C+Mohd+Foad&rft.au=Krejcar%2C+Ondrej&rft.date=2020&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=8&rft.spage=180184&rft.epage=180209&rft_id=info:doi/10.1109%2FACCESS.2020.3027463&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2020_3027463
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon