Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Automatic Intrusion Detection

Handbook of Research on Threat Detection and Countermeasures in Network Security
The automatic intrusion detection can preservation secret multi agent using authentication measurement network threat that proposed system security multi agent distributed system to design a platform for security in order to be applied in distributed system by using the multi agent systems and applying intrusion detection security measurement method (Rijndael encryption) to prevent it.
Published in Chapter:
Automatic Intrusion Detection and Secret Multi Agent Preservation Using Authentication Measurement Network Threat
Ghossoon M. Waleed Al-Saadoon (Applied Science University, Bahrain)
DOI: 10.4018/978-1-4666-6583-5.ch003
Abstract
The computer sciences and their applications are developing continuously. This growth should be protected. One of the methods to fulfill this approach by using the encryption method ‘Rijndael Advanced Encryption Standard' is applied for security information DBs, to prevent an unauthorized user from accessing any stored information. The security method determines the resources that agents are able to have an access and to give permission to other agents. Security and security assurance are special integrity in agent system to enable it to cooperate or to complete the application and where agent system may not be trustful to visiting agents. Ideas of this chapter of using multi agent framework is to design the proposed Automatic Intrusion Detection model and to secret multi agent preservation using authentication measurement network threat. This approach uses statistical models to correlate and analyse data in the network. It takes the decisions to control both local and global agent's data bases perceptively. Also it adopts the security problem authentication and authorization by providing a secure distributed agent system.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR