A New Meta-Heuristics for Intrusion Detection System Inspired from the Protection System of Social Bees

2017 ◽  
Vol 11 (1) ◽  
pp. 18-34 ◽  
Author(s):  
Mohamed Amine Boudia ◽  
Reda Mohamed Hamou ◽  
Abdelmalek Amine

In this paper, the authors will propose a meta-heuristic for intrusion detection system by scenario, inspired from the protection system of social bees to their hive. This approach is based on a specialized multi agent system where the authors will give a limited responsibility to each guard bee agent: to secure only one port, this specialization aims to better exploit the training set and the hardware and software performance. The authors will start this paper by a short introduction where they will show the importance of IT security especially today, then they will give a little insight into the state of the art, before starting the essential part of a scientific paper: “our approach” where the authors will explain the natural model, and then they'll simplify their model in a modelling table to share their vision and philosophy to switch from natural model to artificial model, and then they will detail the artificial model they are going to experience in the next chapter, they will discuss the results and make comparison in the two following chapter to get out with a conclusion and perspective of their future work.

Author(s):  
Ahmed Chaouki Lokbani ◽  
Mohamed Amine Boudia

In this paper, the authors propose a meta-heuristic for intrusion detection system by scenario, inspired by the protection system of social bees to their hive. This approach is based on a specialized multi-agent system where the authors give limited responsibility to each guard bee agent: to secure only one port. This specialization aims to better exploit the training set and the hardware and software performance. The authors start this paper with a short introduction where they show the importance of IT security. Then they give a little insight into the state of the art, before starting the essential part of a scientific paper: “Our Approach,” where they explain the natural model. Finally, they simplify their model in a modelling table to share their vision and philosophy to switch from natural model to artificial model.


Author(s):  
Tarek Helmy

The system that monitors the events occurring in a computer system or a network and analyzes the events for sign of intrusions is known as intrusion detection system. The performance of the intrusion detection system can be improved by combing anomaly and misuse analysis. This chapter proposes an ensemble multi-agent-based intrusion detection model. The proposed model combines anomaly, misuse, and host-based detection analysis. The agents in the proposed model use rules to check for intrusions, and adopt machine learning algorithms to recognize unknown actions, to update or create new rules automatically. Each agent in the proposed model encapsulates a specific classification technique, and gives its belief about any packet event in the network. These agents collaborate to determine the decision about any event, have the ability to generalize, and to detect novel attacks. Empirical results indicate that the proposed model is efficient, and outperforms other intrusion detection models.


2017 ◽  
Vol 10 (18) ◽  
pp. 1-6 ◽  
Author(s):  
Omar Achbarou ◽  
My Ahmed El Kiram ◽  
Salim Elbouanani ◽  
◽  
◽  
...  

Author(s):  
Ahmed Chaouki Lokbani ◽  
Ahmed Lehireche ◽  
Reda Mohamed Hamou ◽  
Mohamed Amine Boudia

The aim of the authors' work is to model the intrusion detection system by scenario with a bio-inspired method in this case the system of protection of social bees. The natural pattern of social bees produces security efficiency by its three filters. In this paper, the authors focus on scenario approach they chose as a strategy to intrusion odor recognition of bees. They propose a new philosophy based on limited responsibility for each agent. This proposition aims to better exploit the performance of their hardware, and to use intelligently a kddcup'99 corpus.


Author(s):  
E. Mosqueira Rey ◽  
A. Alonso Betanzos ◽  
B. Guijarro Berdinas ◽  
D. Alonso Rios ◽  
J. Lago Pineiro

Sign in / Sign up

Export Citation Format

Share Document