Abstract
Distributed intrusion detection systems, which consist of spatially distributed monitoring elements, may be applied to detect intrusions in a real-time manner based on the analysis of collected data. This article will present and discuss some selected aspects of the architecture and efficiency of detection systems. The first part considers intrusion detection capabilities as being dependent on different distributed computer communication system parameters. The aim of the second part is to present an idea of the hierarchical architecture of distributed intrusion detection systems, and to assess the quality of monitoring performed in the lower layer of the hierarchical architecture of a distributed intrusion detection system.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Benattou M, Tamine EK (2005) Intelligent agents for distributed intrusion detection system. Proc World Acad Sci Eng Technol 6:190–193
Grzech A (2009) Intelligent distributed intrusion detection systems of computer communication systems. Asian Conference on Intelligent Information and Database Systems, IEEE, Los Alamitos, CA, pp 1–6
Grzech A (2009) Optimal monitoring for distributed intrusion detection system. 14th International Symposium on Artificial Life and Robotics, ISAROB, Oita, Japan, pp 23–26
Hentea M (2007) Intelligent system for information security management: architecture and design issues. Issues Inform Sci Inform Technol 4:29–43
Grzech A (2008) Distributed intrusion detection systems of computer communication networks. NTMS’ 2008 Conference and Workshops, ESR Groups, France, pp 168–172
Grzech A, Kaźmierski M (2008) Quality of distributed monitoring system for detection of network traffic anomalies. Found Control Manag Sci 10:51–64
Ozsoy F, Pinar M (2006) An exact algorithm for the capacitated vertex p-center problem. Comput Oper Res 33(5):1920–1936
Peddabachgari S, Abraha A, Grosan C, et al (2005) Modeling intrusion detection system using hybrid intelligent systems (www.sciencedirect.com)
Grzech A (2006) Anomaly detection in distributed computer communication systems. Cybern Syst 36(7):635–652
Bashah N, Shanmugam B, Ahmed AM (2005) Hybrid intelligent detection system. Proc World Acad Sci Eng Technol 6:291–294
Author information
Authors and Affiliations
Corresponding author
Additional information
This work was presented in part at the 14th International Symposium on Artificial Life and Robotics, Oita, Japan, February 5–7, 2009
About this article
Cite this article
Grzech, A.P. Optimal monitoring system for a distributed intrusion detection system. Artif Life Robotics 14, 453–456 (2009). https://doi.org/10.1007/s10015-009-0740-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10015-009-0740-8