Matches in SemOpenAlex for { <https://semopenalex.org/work/W1542665489> ?p ?o ?g. }
- W1542665489 abstract "The problem of the network security is taken up since eighties (Denning et al., 1987) and is developed up today (Beltilch et al., 2004, Bera, 2010, Dasgupta, 1999, Basile, 2007, Wilson, 1999). A major problem of automatic intrusion detection is that, it is difficult to make a difference between normal and abnormal user behaviour. Intrusion detection system should not only recognise the previously known patterns of attacks, but also react in case of appearance of the new events that violate the network security policy. The distributed nature of the task of the network security monitoring requires applying of the distributed tools for network security maintaining. The most important postulate addressed to the intrusion detection systems is that, such systems should automatically react in case of detecting the security policy breach to prevent the attack execution or to reduce the potential loss in the network systems. Intrusion detection systems should be equipped with the components responsible for the permanent observation of the states of monitored nodes and components that integrate the results of these observations and diagnose the security level of the system (Kolaczek et al., 2005, Nguyen et al., 2006). A comprehensive survey of anomaly detection systems is presented in (Patcha & Park, 2007) and a comparison of different approaches to intrusion detection systems is given in (Bejtlich, 2004). One of the first agent systems for network security monitoring has been proposed in works (Balasubramaniyet et al., 1998, Spafford & Zamboni, 2000). In work (Kolaczek et al., 2005) a framework of an original proposal of the intrusion detection system based on the multi-agent approach was presented. In particular, the architecture of such a system and the task of agents were specified. Proposed ideas were further developed and in work (Nguyen et al., 2006) the problem of anomalies detection on the basis of the nodes traffic analysis was discussed. The proposal of the method for Denial of Service Attack detection was given in (Prusiewicz, 2008a). In this work we propose a novel framework of a multi-agent system for anomaly detection. The originality of our solution consists of applying the social network approach to Man in the Middle Attack (MITM) detection in a network system. Our proposal is based on the social networks discovery and their characteristics measurement to detect anomalies in network traffic. We assume that network communication between nodes constitutes social network of users and their applications, so the appropriate methods of social network formal analysis can be applied. The other important assumption is that values of these social" @default.
- W1542665489 created "2016-06-24" @default.
- W1542665489 creator A5030567658 @default.
- W1542665489 creator A5074117759 @default.
- W1542665489 date "2011-03-22" @default.
- W1542665489 modified "2023-09-26" @default.
- W1542665489 title "Social Network Approach to Anomaly Detection in Network Systems" @default.
- W1542665489 cites W1490647514 @default.
- W1542665489 cites W1509966100 @default.
- W1542665489 cites W1531884035 @default.
- W1542665489 cites W1537992138 @default.
- W1542665489 cites W1553052391 @default.
- W1542665489 cites W1854214752 @default.
- W1542665489 cites W1876541627 @default.
- W1542665489 cites W1951268159 @default.
- W1542665489 cites W2007087405 @default.
- W1542665489 cites W2015370254 @default.
- W1542665489 cites W2055788618 @default.
- W1542665489 cites W2058077802 @default.
- W1542665489 cites W2061901927 @default.
- W1542665489 cites W2100903665 @default.
- W1542665489 cites W2109224931 @default.
- W1542665489 cites W2110531057 @default.
- W1542665489 cites W2114835826 @default.
- W1542665489 cites W2122989928 @default.
- W1542665489 cites W2124365372 @default.
- W1542665489 cites W2141113219 @default.
- W1542665489 cites W2160353247 @default.
- W1542665489 cites W2163772663 @default.
- W1542665489 cites W2165967980 @default.
- W1542665489 cites W2182514239 @default.
- W1542665489 cites W2410456142 @default.
- W1542665489 cites W2416263457 @default.
- W1542665489 cites W26772505 @default.
- W1542665489 cites W2951117584 @default.
- W1542665489 cites W66410152 @default.
- W1542665489 doi "https://doi.org/10.5772/15365" @default.
- W1542665489 hasPublicationYear "2011" @default.
- W1542665489 type Work @default.
- W1542665489 sameAs 1542665489 @default.
- W1542665489 citedByCount "1" @default.
- W1542665489 countsByYear W15426654892013 @default.
- W1542665489 crossrefType "book-chapter" @default.
- W1542665489 hasAuthorship W1542665489A5030567658 @default.
- W1542665489 hasAuthorship W1542665489A5074117759 @default.
- W1542665489 hasBestOaLocation W15426654891 @default.
- W1542665489 hasConcept C124101348 @default.
- W1542665489 hasConcept C127313418 @default.
- W1542665489 hasConcept C127413603 @default.
- W1542665489 hasConcept C137524506 @default.
- W1542665489 hasConcept C154908896 @default.
- W1542665489 hasConcept C158251709 @default.
- W1542665489 hasConcept C17409809 @default.
- W1542665489 hasConcept C182590292 @default.
- W1542665489 hasConcept C201995342 @default.
- W1542665489 hasConcept C27061796 @default.
- W1542665489 hasConcept C2780451532 @default.
- W1542665489 hasConcept C35525427 @default.
- W1542665489 hasConcept C38652104 @default.
- W1542665489 hasConcept C41008148 @default.
- W1542665489 hasConcept C739882 @default.
- W1542665489 hasConcept C90936777 @default.
- W1542665489 hasConceptScore W1542665489C124101348 @default.
- W1542665489 hasConceptScore W1542665489C127313418 @default.
- W1542665489 hasConceptScore W1542665489C127413603 @default.
- W1542665489 hasConceptScore W1542665489C137524506 @default.
- W1542665489 hasConceptScore W1542665489C154908896 @default.
- W1542665489 hasConceptScore W1542665489C158251709 @default.
- W1542665489 hasConceptScore W1542665489C17409809 @default.
- W1542665489 hasConceptScore W1542665489C182590292 @default.
- W1542665489 hasConceptScore W1542665489C201995342 @default.
- W1542665489 hasConceptScore W1542665489C27061796 @default.
- W1542665489 hasConceptScore W1542665489C2780451532 @default.
- W1542665489 hasConceptScore W1542665489C35525427 @default.
- W1542665489 hasConceptScore W1542665489C38652104 @default.
- W1542665489 hasConceptScore W1542665489C41008148 @default.
- W1542665489 hasConceptScore W1542665489C739882 @default.
- W1542665489 hasConceptScore W1542665489C90936777 @default.
- W1542665489 hasLocation W15426654891 @default.
- W1542665489 hasLocation W15426654892 @default.
- W1542665489 hasOpenAccess W1542665489 @default.
- W1542665489 hasPrimaryLocation W15426654891 @default.
- W1542665489 hasRelatedWork W1528114613 @default.
- W1542665489 hasRelatedWork W1537992138 @default.
- W1542665489 hasRelatedWork W1567294858 @default.
- W1542665489 hasRelatedWork W1593362593 @default.
- W1542665489 hasRelatedWork W1970604502 @default.
- W1542665489 hasRelatedWork W1993426957 @default.
- W1542665489 hasRelatedWork W2071330249 @default.
- W1542665489 hasRelatedWork W2148684062 @default.
- W1542665489 hasRelatedWork W2181430401 @default.
- W1542665489 hasRelatedWork W2303345353 @default.
- W1542665489 hasRelatedWork W2345595457 @default.
- W1542665489 hasRelatedWork W2739540282 @default.
- W1542665489 hasRelatedWork W2786142205 @default.
- W1542665489 hasRelatedWork W3035163759 @default.
- W1542665489 hasRelatedWork W3048286037 @default.
- W1542665489 hasRelatedWork W3138080548 @default.
- W1542665489 hasRelatedWork W3182221597 @default.
- W1542665489 hasRelatedWork W50213487 @default.