An Approach based on Social Bees for an Intrusion Detection System by Scenario

Author(s):  
Ahmed Chaouki Lokbani ◽  
Ahmed Lehireche ◽  
Reda Mohamed Hamou ◽  
Mohamed Amine Boudia

The aim of the authors' work is to model the intrusion detection system by scenario with a bio-inspired method in this case the system of protection of social bees. The natural pattern of social bees produces security efficiency by its three filters. In this paper, the authors focus on scenario approach they chose as a strategy to intrusion odor recognition of bees. They propose a new philosophy based on limited responsibility for each agent. This proposition aims to better exploit the performance of their hardware, and to use intelligently a kddcup'99 corpus.

Author(s):  
Ahmed Chaouki Lokbani ◽  
Ahmed Lehireche ◽  
Reda Mohamed Hamou ◽  
Mohamed Amine Boudia

The aim of the authors' work is to model the intrusion detection system by scenario with a bio-inspired method in this case the system of protection of social bees. The natural pattern of social bees produces security efficiency by its three filters. In this paper, the authors focus on scenario approach they chose as a strategy to intrusion odor recognition of bees. They propose a new philosophy based on limited responsibility for each agent. This proposition aims to better exploit the performance of their hardware, and to use intelligently a kddcup'99 corpus.


Author(s):  
Ahmed Chaouki Lokbani ◽  
Mohamed Amine Boudia

In this paper, the authors propose a meta-heuristic for intrusion detection system by scenario, inspired by the protection system of social bees to their hive. This approach is based on a specialized multi-agent system where the authors give limited responsibility to each guard bee agent: to secure only one port. This specialization aims to better exploit the training set and the hardware and software performance. The authors start this paper with a short introduction where they show the importance of IT security. Then they give a little insight into the state of the art, before starting the essential part of a scientific paper: “Our Approach,” where they explain the natural model. Finally, they simplify their model in a modelling table to share their vision and philosophy to switch from natural model to artificial model.


2017 ◽  
Vol 11 (1) ◽  
pp. 18-34 ◽  
Author(s):  
Mohamed Amine Boudia ◽  
Reda Mohamed Hamou ◽  
Abdelmalek Amine

In this paper, the authors will propose a meta-heuristic for intrusion detection system by scenario, inspired from the protection system of social bees to their hive. This approach is based on a specialized multi agent system where the authors will give a limited responsibility to each guard bee agent: to secure only one port, this specialization aims to better exploit the training set and the hardware and software performance. The authors will start this paper by a short introduction where they will show the importance of IT security especially today, then they will give a little insight into the state of the art, before starting the essential part of a scientific paper: “our approach” where the authors will explain the natural model, and then they'll simplify their model in a modelling table to share their vision and philosophy to switch from natural model to artificial model, and then they will detail the artificial model they are going to experience in the next chapter, they will discuss the results and make comparison in the two following chapter to get out with a conclusion and perspective of their future work.


Sign in / Sign up

Export Citation Format

Share Document