, DoS (Denial of Service
, U2R (Unauthorized Access to Root)
, Probing (Surveillance and Probing)
, Table 2 shows the distributions of record types in training and testing datasets, used during our experiments. The first row shows the numbers of normal network packets
Mining Association Rules Between Sets of Items in Large Databases, Proceedings of the International Conference on Management of Data, pp.207-216, 1993. ,
A New Generic Basis of Factual and Implicative Association rules. Intelligent Data Analysis, vol.13, pp.633-656, 2009. ,
Detecting Known and Novel Network Intrusion, Proceedings of the 21st IFIP International Conference on Information Security, pp.258-270, 2006. ,
A Snort-Based Mobile Agent For A Distributed Intrusion Detection System, Proceedings of the International Conference on Security and Cryptography, 2011. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00798311
AD-Clust: Dtection des Anomalies Basée sur le Clustering. In Atelier Clustering Incrémental et Méthodes de Détection de Nouveauté en conjonction avec 11ème Conférence Francophone d'Extraction et de Gestion de Connaissances EGC, pp.27-41, 2011. ,
Effective data mining techniques for intrusion detection and prevention system, Proceedings of the International Conference on Advanced Computing, Communication and Networks'11, pp.1130-1134, 2011. ,
Data Mining for Cyber Security, Data Warehousing and Data Mining Techniques for Computer Security, pp.83-103, 2006. ,
A New Data-Mining Based Approach for Network Intrusion Detection, Proceedings of the 7th Annual Conference on Communication Networks and Services Research, pp.372-377, 2009. ,
Towards a Taxonomy of Intrusion-Detection Systems, Computer Networks, vol.31, pp.805-822, 1999. ,
An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks, Expert System with Applications, vol.29, pp.713-722, 2005. ,
A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise, Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining, pp.226-231, 1996. ,
The KDD Process of Extracting Useful Knowledge from Volumes of Data, Communications of the ACM, vol.39, issue.11, pp.27-34, 1996. ,
Rete: A Fast Algorithm for the many Pattern/many Object Pattern match Problem, Artificial Intelligence, vol.19, issue.1, pp.17-37, 1982. ,
A Framework for Distributed Intrusion Detection using Interest Driven Cooperating Agents, Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection, 2001. ,
Y-Means: A Clustering Method for Intrusion Detection, Proceedings of Canadian Conference on Electrical and Computer Engineering ,
, , pp.1083-1086, 2003.
Automated Discovery of Concise Predictive Rules for Intrusion Detection, Journal of Systems and Software, vol.60, issue.3, pp.165-175, 2002. ,
Adaptive Ensemble Multi-Agent Based Intrusion Detection Model, Developing Advanced Web Services through P2P Computing and Autonomous Agents: Trends and Innovations, pp.36-48, 2010. ,
DOI : 10.4018/978-1-61520-973-6.ch003
Multiagent Systems for Network Intrusion Detection: A Review, Proceedings on the Computational International in Security for Information Systems, vol.63, pp.143-154, 2009. ,
A Multi-Agent-based Distributed Intrusion Detection System, Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering, pp.141-143, 2010. ,
Intrusion Detection Method Using Neural Networks Based on the Reduction of Characteristics, Proceedings of the 10th International WorkConference on Artificial Neural Networks, pp.1296-1303, 2009. ,
An Intrusion Detection and Prevention Model Based on Intelligent Multi-Agent Systems, Signatures and Reaction Rules Ontologies, Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS'09, pp.237-245, 2009. ,
Attack Pattern Analysis Framework for Multiagent Intrusion Detection System, International Journal of Computational Intelligence Systems, vol.1, issue.3, 2008. ,
DOI : 10.1080/18756891.2008.9727619
URL : https://doi.org/10.1080/18756891.2008.9727619
A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems, 1999. ,
DOI : 10.1145/382912.382914
URL : http://www.cs.unc.edu/~jeffay/courses/nidsS05/mining/lee_dmids_frmwk.pdf
Intrusion Detection System Based on New Association Rule Mining Model, Proceedings of the International Conference on Granular Computing ,
, , pp.512-515, 2005.
Agent-Based Network Intrusion Detection System Using Data Mining Approaches, Proceedings of the 3rd International Conference on Information Technology and Applications, pp.131-136, 2005. ,
Some Methods for Classification and Analysis of Multivariate Observations, Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability, pp.281-297, 1967. ,
Proper Use of ROC Curves in Intrusion/Anomaly Detection, 2004. ,
Design and Implementation of a Data Mining-Based Network Intrusion Detection Scheme, Asian Journal of Information Technology, vol.10, issue.4, pp.136-141, 2011. ,
A Snort-based Agent for a JADE Multi-agent Intrusion Detection System, International Journal of Intelligent Information and Database Systems, vol.3, issue.1, pp.107-121, 2009. ,
A Self-Organized Multiagent System for Intrusion Detection, Proceedings of the 4th International Workshop on Agents and Data Mining Interaction, pp.84-94, 2009. ,
DOI : 10.1007/978-3-642-03603-3_7
Efficient Mining of Association Rules Using Closed Itemset Lattices, Journal of Information Systems, vol.24, issue.1, pp.25-46, 1999. ,
An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends, Computer Networks, vol.51, pp.3448-3470, 2007. ,
Modeling Intrusion Detection System Using Hybrid Intelligent Systems, Journal of Network Computer Applications, vol.30, pp.114-132, 2007. ,
DOI : 10.1016/j.jnca.2005.06.003
Intrusion Detection with Unlabeled Data using Clustering, Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001), 2001. ,
CAMNEP: Agent-Based Network Intrusion Detection System, Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems, pp.133-136, 2008. ,
Snort -Lightweight Intrusion Detection System for Networks, Proceedings of of the 13th USENIX Conference on System Administration (LISA'99), pp.229-238, 1999. ,
Network Intrusion Detection System Using Neural Networks, Proceedings of the 4th International Conference on Natural Computation (ICNC'08), pp.242-246, 2008. ,
DOI : 10.1109/icnc.2008.900
A Multiagent-based Intrusion Detection System with the Support of Multi-Class Supervised Classification, Data Mining and Multiagent Integration, pp.127-142, 2009. ,
Intrusion Detection Using Autonomous Agents, The International Journal of Computer and Telecommunications Networking, vol.34, issue.4, pp.547-570, 2000. ,
DOI : 10.1016/s1389-1286(00)00136-5
URL : http://people.scs.carleton.ca/~soma/id-2006w/readings/spafford-agents.pdf
JAM: Java Agents for Meta-Learning over Distributed Databases, Ptoceedings of the 3rd International Conference on Knowledge Discovery and Data Mining, pp.74-81, 1997. ,
Network Intrusion Detection Using Association Rules, International Journal of Recent Trends in Engineering, vol.2, issue.2, pp.202-204, 2009. ,
An Introduction to MultiAgent Systems -Second Edition, 2009. ,
Modeling Intrusion Detection System by Discovering Association Rule in Rough Set Theory Framework, Proceedings of the International Conference on Computational Intelligence for Modelling Control and Automation, pp.24-29, 2006. ,
Distributed Intrusion Detection Based on Clustering, Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, pp.2379-2383, 2005. ,
G-Means: A Clustering Algorithm for Intrusion Detection, Processing of the 15th International Conference on Advances in Neuro-Information, pp.563-570, 2008. ,