Reference Hub5
A Cooperative Intrusion Detection Model Based on Granular Computing and Agent Technologies

A Cooperative Intrusion Detection Model Based on Granular Computing and Agent Technologies

Wei Zhang, Shaohua Teng, Haibin Zhu, Dongning Liu
Copyright: © 2013 |Volume: 5 |Issue: 3 |Pages: 21
ISSN: 1943-0744|EISSN: 1943-0752|EISBN13: 9781466633940|DOI: 10.4018/ijats.2013070104
Cite Article Cite Article

MLA

Zhang, Wei, et al. "A Cooperative Intrusion Detection Model Based on Granular Computing and Agent Technologies." IJATS vol.5, no.3 2013: pp.54-74. http://doi.org/10.4018/ijats.2013070104

APA

Zhang, W., Teng, S., Zhu, H., & Liu, D. (2013). A Cooperative Intrusion Detection Model Based on Granular Computing and Agent Technologies. International Journal of Agent Technologies and Systems (IJATS), 5(3), 54-74. http://doi.org/10.4018/ijats.2013070104

Chicago

Zhang, Wei, et al. "A Cooperative Intrusion Detection Model Based on Granular Computing and Agent Technologies," International Journal of Agent Technologies and Systems (IJATS) 5, no.3: 54-74. http://doi.org/10.4018/ijats.2013070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper initially analyzes the methods of four attack types, including Probing, DoS (Denial of Service), R2L (Remote to Local) and U2R (User to Root). It then categorizes attacks into four cases which are, respectively, one host-one host, one host-many hosts, many hosts-one host and many hosts-many hosts. Categorization is based on resource and destination addresses of network packages. Granular computing methodology is then applied to intrusion detection. With the support of the granular computing methodology and agent technologies, a cooperative intrusion detection model is proposed. Furthermore, the construction for an intrusion detection agent is presented. Finally, experiments are conducted. Results indicate that the proposed method can detect slow scanning attacks which cannot be detected by a traditional scanning detector.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.