Reference Hub5
A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees

A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees

Mohamed Amine Boudia, Reda Mohamed Hamou, Abdelmalek Amine
Copyright: © 2017 |Volume: 11 |Issue: 1 |Pages: 17
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781522511731|DOI: 10.4018/IJISP.2017010102
Cite Article Cite Article

MLA

Boudia, Mohamed Amine, et al. "A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees." IJISP vol.11, no.1 2017: pp.18-34. http://doi.org/10.4018/IJISP.2017010102

APA

Boudia, M. A., Hamou, R. M., & Amine, A. (2017). A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees. International Journal of Information Security and Privacy (IJISP), 11(1), 18-34. http://doi.org/10.4018/IJISP.2017010102

Chicago

Boudia, Mohamed Amine, Reda Mohamed Hamou, and Abdelmalek Amine. "A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees," International Journal of Information Security and Privacy (IJISP) 11, no.1: 18-34. http://doi.org/10.4018/IJISP.2017010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this paper, the authors will propose a meta-heuristic for intrusion detection system by scenario, inspired from the protection system of social bees to their hive. This approach is based on a specialized multi agent system where the authors will give a limited responsibility to each guard bee agent: to secure only one port, this specialization aims to better exploit the training set and the hardware and software performance. The authors will start this paper by a short introduction where they will show the importance of IT security especially today, then they will give a little insight into the state of the art, before starting the essential part of a scientific paper: “our approach” where the authors will explain the natural model, and then they'll simplify their model in a modelling table to share their vision and philosophy to switch from natural model to artificial model, and then they will detail the artificial model they are going to experience in the next chapter, they will discuss the results and make comparison in the two following chapter to get out with a conclusion and perspective of their future work.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.