Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
    Communities & Collections
    Research Outputs
    Fundings & Projects
    People
    Statistics
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Staff Publications
  3. Scopus
  4. The architecture of saaids: Secured autonomous agent-Based intrusion detection system
 
  • Details
Options

The architecture of saaids: Secured autonomous agent-Based intrusion detection system

Journal
Proceedings of the 4th IASTED International Conference on Advances in Computer Science and Technology, ACST 2008
Date Issued
2008
Author(s)
Mohd Nasir L.H.
Seman K.
Madihah Mohd Saudi 
Universiti Sains Islam Malaysia 
Abstract
SAAIDS architecture is developed to overcome three issues on existing agent-based intrusion Detection System (IDS); single-point of failure, hierarchical structure on multilevel authorization problem and delay on information sending. Besides that, the architecture tend to provide secure agent communication and protection of the agent itself. In overcoming single-point failure the architecture is designed to enrol all components in an agent. P2P connection solved hierarchical structure on multilevel authorization problem and delay on information sending by its design which provides direct connection between agents. In avoiding single point of bottle-neck, the architecture was designed with agent communication protocol functions as queuing message sending by its forms and priority. The architecture components and processes discussed in this paper.
Subjects

Agent communication

Agent-Based intrusion...

Computer networks and...

Computer security

Agent communication

Agent communication p...

Agent-Based intrusion...

Computer security

Hierarchical structur...

Message sending

Point failures

Single points

Agents

Architectural design

Autonomous agents

Communication

Computer crime

Computers

Internet

Network architecture

Security systems

Intrusion detection

Welcome to SRP

"A platform where you can access full-text research
papers, journal articles, conference papers, book
chapters, and theses by USIM researchers and students.”

Contact:
  • ddms@usim.edu.my
  • 06-798 6206 / 6221
  • USIM Library
Follow Us:
READ MORE Copyright © 2024 Universiti Sains Islam Malaysia