Skip to main content
Log in

Optimal monitoring system for a distributed intrusion detection system

  • Invited Talk
  • Published:
Artificial Life and Robotics Aims and scope Submit manuscript

Abstract

Distributed intrusion detection systems, which consist of spatially distributed monitoring elements, may be applied to detect intrusions in a real-time manner based on the analysis of collected data. This article will present and discuss some selected aspects of the architecture and efficiency of detection systems. The first part considers intrusion detection capabilities as being dependent on different distributed computer communication system parameters. The aim of the second part is to present an idea of the hierarchical architecture of distributed intrusion detection systems, and to assess the quality of monitoring performed in the lower layer of the hierarchical architecture of a distributed intrusion detection system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Benattou M, Tamine EK (2005) Intelligent agents for distributed intrusion detection system. Proc World Acad Sci Eng Technol 6:190–193

    Google Scholar 

  2. Grzech A (2009) Intelligent distributed intrusion detection systems of computer communication systems. Asian Conference on Intelligent Information and Database Systems, IEEE, Los Alamitos, CA, pp 1–6

    Chapter  Google Scholar 

  3. Grzech A (2009) Optimal monitoring for distributed intrusion detection system. 14th International Symposium on Artificial Life and Robotics, ISAROB, Oita, Japan, pp 23–26

    Google Scholar 

  4. Hentea M (2007) Intelligent system for information security management: architecture and design issues. Issues Inform Sci Inform Technol 4:29–43

    Google Scholar 

  5. Grzech A (2008) Distributed intrusion detection systems of computer communication networks. NTMS’ 2008 Conference and Workshops, ESR Groups, France, pp 168–172

    Google Scholar 

  6. Grzech A, Kaźmierski M (2008) Quality of distributed monitoring system for detection of network traffic anomalies. Found Control Manag Sci 10:51–64

    Google Scholar 

  7. Ozsoy F, Pinar M (2006) An exact algorithm for the capacitated vertex p-center problem. Comput Oper Res 33(5):1920–1936

    MathSciNet  Google Scholar 

  8. Peddabachgari S, Abraha A, Grosan C, et al (2005) Modeling intrusion detection system using hybrid intelligent systems (www.sciencedirect.com)

  9. Grzech A (2006) Anomaly detection in distributed computer communication systems. Cybern Syst 36(7):635–652

    Article  Google Scholar 

  10. Bashah N, Shanmugam B, Ahmed AM (2005) Hybrid intelligent detection system. Proc World Acad Sci Eng Technol 6:291–294

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adam Piotr Grzech.

Additional information

This work was presented in part at the 14th International Symposium on Artificial Life and Robotics, Oita, Japan, February 5–7, 2009

About this article

Cite this article

Grzech, A.P. Optimal monitoring system for a distributed intrusion detection system. Artif Life Robotics 14, 453–456 (2009). https://doi.org/10.1007/s10015-009-0740-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10015-009-0740-8

Key words

Navigation