, DoS (Denial of Service

, U2R (Unauthorized Access to Root)

, Probing (Surveillance and Probing)

, Table 2 shows the distributions of record types in training and testing datasets, used during our experiments. The first row shows the numbers of normal network packets

R. Agrawal, T. Imielinski, and A. Swami, Mining Association Rules Between Sets of Items in Large Databases, Proceedings of the International Conference on Management of Data, pp.207-216, 1993.

S. Ben-yahia, G. Gasmi, and E. Mephu-nguifo, A New Generic Basis of Factual and Implicative Association rules. Intelligent Data Analysis, vol.13, pp.633-656, 2009.

Y. Bouzida and F. Cuppens, Detecting Known and Novel Network Intrusion, Proceedings of the 21st IFIP International Conference on Information Security, pp.258-270, 2006.

I. Brahmi, S. Ben-yahia, and P. Poncelet, A Snort-Based Mobile Agent For A Distributed Intrusion Detection System, Proceedings of the International Conference on Security and Cryptography, 2011.
URL : https://hal.archives-ouvertes.fr/lirmm-00798311

I. Brahmi, S. Ben-yahia, and P. Poncelet, AD-Clust: Dtection des Anomalies Basée sur le Clustering. In Atelier Clustering Incrémental et Méthodes de Détection de Nouveauté en conjonction avec 11ème Conférence Francophone d'Extraction et de Gestion de Connaissances EGC, pp.27-41, 2011.

A. Chalak, R. Bhosale, and N. D. Harale, Effective data mining techniques for intrusion detection and prevention system, Proceedings of the International Conference on Advanced Computing, Communication and Networks'11, pp.1130-1134, 2011.

V. Chandola, E. Eilertson, L. Ertoz, G. Simon, and V. Kumar, Data Mining for Cyber Security, Data Warehousing and Data Mining Techniques for Computer Security, pp.83-103, 2006.

D. Christine, J. H. Ik, and Z. Wenjun, A New Data-Mining Based Approach for Network Intrusion Detection, Proceedings of the 7th Annual Conference on Communication Networks and Services Research, pp.372-377, 2009.

H. Debar, M. Dacier, and A. Wespi, Towards a Taxonomy of Intrusion-Detection Systems, Computer Networks, vol.31, pp.805-822, 1999.

O. Depren, M. Topallar, E. Anarim, and M. K. Ciliz, An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks, Expert System with Applications, vol.29, pp.713-722, 2005.

M. Ester, H. Kriegel, J. Sander, and X. Xu, A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise, Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining, pp.226-231, 1996.

U. Fayyad, G. Piatetsky-shapiro, and P. Smyth, The KDD Process of Extracting Useful Knowledge from Volumes of Data, Communications of the ACM, vol.39, issue.11, pp.27-34, 1996.

C. Forgy, Rete: A Fast Algorithm for the many Pattern/many Object Pattern match Problem, Artificial Intelligence, vol.19, issue.1, pp.17-37, 1982.

R. Gopalakrishna and E. H. Spafford, A Framework for Distributed Intrusion Detection using Interest Driven Cooperating Agents, Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection, 2001.

Y. Guan, A. Ghorbani, and N. Belacel, Y-Means: A Clustering Method for Intrusion Detection, Proceedings of Canadian Conference on Electrical and Computer Engineering

. Montréal, , pp.1083-1086, 2003.

G. Helmer, J. S. Wong, V. G. Honavar, and L. Miller, Automated Discovery of Concise Predictive Rules for Intrusion Detection, Journal of Systems and Software, vol.60, issue.3, pp.165-175, 2002.

T. Helmy, Adaptive Ensemble Multi-Agent Based Intrusion Detection Model, Developing Advanced Web Services through P2P Computing and Autonomous Agents: Trends and Innovations, pp.36-48, 2010.
DOI : 10.4018/978-1-61520-973-6.ch003

´. A. Herrero and E. Corchado, Multiagent Systems for Network Intrusion Detection: A Review, Proceedings on the Computational International in Security for Information Systems, vol.63, pp.143-154, 2009.

W. Huang, Y. An, and W. Du, A Multi-Agent-based Distributed Intrusion Detection System, Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering, pp.141-143, 2010.

L. Iren, M. Francisco, M. F. José, L. Rogelio, G. J. Antonio et al., Intrusion Detection Method Using Neural Networks Based on the Reduction of Characteristics, Proceedings of the 10th International WorkConference on Artificial Neural Networks, pp.1296-1303, 2009.

G. A. Isaza, A. G. Castillo, and N. D. Duque, An Intrusion Detection and Prevention Model Based on Intelligent Multi-Agent Systems, Signatures and Reaction Rules Ontologies, Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS'09, pp.237-245, 2009.

G. Kolaczek and K. Juszczyszyn, Attack Pattern Analysis Framework for Multiagent Intrusion Detection System, International Journal of Computational Intelligence Systems, vol.1, issue.3, 2008.
DOI : 10.1080/18756891.2008.9727619

URL : https://doi.org/10.1080/18756891.2008.9727619

W. Lee, A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems, 1999.
DOI : 10.1145/382912.382914

URL : http://www.cs.unc.edu/~jeffay/courses/nidsS05/mining/lee_dmids_frmwk.pdf

T. R. Li and W. M. Pan, Intrusion Detection System Based on New Association Rule Mining Model, Proceedings of the International Conference on Granular Computing

C. Beijing, , pp.512-515, 2005.

C. Lui, T. Fu, and T. Cheung, Agent-Based Network Intrusion Detection System Using Data Mining Approaches, Proceedings of the 3rd International Conference on Information Technology and Applications, pp.131-136, 2005.

J. B. Macqueen, Some Methods for Classification and Analysis of Multivariate Observations, Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability, pp.281-297, 1967.

R. A. Maxion and R. R. Roberts, Proper Use of ROC Curves in Intrusion/Anomaly Detection, 2004.

R. G. Mohammed and A. M. Awadelkarim, Design and Implementation of a Data Mining-Based Network Intrusion Detection Scheme, Asian Journal of Information Technology, vol.10, issue.4, pp.136-141, 2011.

E. Mosqueira-rey, B. Guijarro-berdias, A. Alonso-betanzos, D. Alonso-ros, and J. Lago-pieiro, A Snort-based Agent for a JADE Multi-agent Intrusion Detection System, International Journal of Intelligent Information and Database Systems, vol.3, issue.1, pp.107-121, 2009.

E. J. Palomo, E. Domínguez, R. M. Luque, and J. Mu, A Self-Organized Multiagent System for Intrusion Detection, Proceedings of the 4th International Workshop on Agents and Data Mining Interaction, pp.84-94, 2009.
DOI : 10.1007/978-3-642-03603-3_7

N. Pasquier, Y. Bastide, R. Taouil, and L. Lakhal, Efficient Mining of Association Rules Using Closed Itemset Lattices, Journal of Information Systems, vol.24, issue.1, pp.25-46, 1999.

A. Patcha and J. M. Park, An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends, Computer Networks, vol.51, pp.3448-3470, 2007.

S. Peddabachigari, A. Abraham, C. Grosan, and J. Thomas, Modeling Intrusion Detection System Using Hybrid Intelligent Systems, Journal of Network Computer Applications, vol.30, pp.114-132, 2007.
DOI : 10.1016/j.jnca.2005.06.003

L. Portnoy, E. Eskin, and W. S. Stolfo, Intrusion Detection with Unlabeled Data using Clustering, Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001), 2001.

M. Rehák, M. Pechoucek, P. Celeda, J. Novotny, and P. Minarik, CAMNEP: Agent-Based Network Intrusion Detection System, Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems, pp.133-136, 2008.

M. Roesch, Snort -Lightweight Intrusion Detection System for Networks, Proceedings of of the 13th USENIX Conference on System Administration (LISA'99), pp.229-238, 1999.

J. Shun and H. A. Malki, Network Intrusion Detection System Using Neural Networks, Proceedings of the 4th International Conference on Natural Computation (ICNC'08), pp.242-246, 2008.
DOI : 10.1109/icnc.2008.900

M. Shyu and V. Sainani, A Multiagent-based Intrusion Detection System with the Support of Multi-Class Supervised Classification, Data Mining and Multiagent Integration, pp.127-142, 2009.

E. H. Spafford and D. Zamboni, Intrusion Detection Using Autonomous Agents, The International Journal of Computer and Telecommunications Networking, vol.34, issue.4, pp.547-570, 2000.
DOI : 10.1016/s1389-1286(00)00136-5

URL : http://people.scs.carleton.ca/~soma/id-2006w/readings/spafford-agents.pdf

S. Stolfo, A. L. Prodromidis, S. Tselepis, W. Lee, D. W. Fan et al., JAM: Java Agents for Meta-Learning over Distributed Databases, Ptoceedings of the 3rd International Conference on Knowledge Discovery and Data Mining, pp.74-81, 1997.

F. S. Tsai, Network Intrusion Detection Using Association Rules, International Journal of Recent Trends in Engineering, vol.2, issue.2, pp.202-204, 2009.

M. Wooldridge, An Introduction to MultiAgent Systems -Second Edition, 2009.

W. Xuren, H. Famei, and X. Rongsheng, Modeling Intrusion Detection System by Discovering Association Rule in Rough Set Theory Framework, Proceedings of the International Conference on Computational Intelligence for Modelling Control and Automation, pp.24-29, 2006.

Y. F. Zhang, Z. Y. Xiong, and X. Q. Wang, Distributed Intrusion Detection Based on Clustering, Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, pp.2379-2383, 2005.

Z. Zhao, S. Guo, Q. Xu, and T. Ban, G-Means: A Clustering Algorithm for Intrusion Detection, Processing of the 15th International Conference on Advances in Neuro-Information, pp.563-570, 2008.