Nothing Special   »   [go: up one dir, main page]

loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Mohamed Shili 1 ; Hamza Gharsellaoui 2 and Dalel Kanzari 3

Affiliations: 1 LISI Laboratory, National Institute of Applied Sciences and Technology (INSAT) and Carthage University, Tunisia ; 2 LISI Laboratory, National Institute of Applied Sciences and Technology (INSAT), Carthage University, National Engineering School of Carthage (ENIC), Carthage University, Al Jouf College of Technology and TVTC, Tunisia ; 3 Institute of Applied Sciences and Technology of Sousse (ISSATso) and Sousse University, Tunisia

Keyword(s): Network Security, Intelligent Agent, Misuse Systems, Attack Propagation, Intrusion Detection.

Related Ontology Subjects/Areas/Topics: Applications ; Artificial Intelligence ; Enterprise Software Technologies ; Intelligent Problem Solving ; Knowledge Engineering and Ontology Development ; Knowledge-Based Systems ; Methodologies and Technologies ; Operational Research ; Risk Management ; Software and Information Security ; Software Engineering ; Software Engineering Methods and Techniques ; Software Project Management ; Symbolic Systems

Abstract: The great number of heterogeneous interconnected operating systems gives greater access to intruders and makes it easier for malicious users to break systems security policy. Also, a single security control agent is insufficient to monitor multiple interconnected hosts and to protect distributed operating systems from hostile uses. This paper shows the ability of distributed security controller’s agents to correlate data stream from heterogeneous hosts and to trace abnormal behavior in order to protect network security. An experimental study is done to improve our proposed approach.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 65.254.225.175

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Shili, M.; Gharsellaoui, H. and Kanzari, D. (2016). Distributed Intelligent Systems for Network Security Control. In Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - ICSOFT-EA; ISBN 978-989-758-194-6, SciTePress, pages 348-352. DOI: 10.5220/0006009203480352

@conference{icsoft-ea16,
author={Mohamed Shili. and Hamza Gharsellaoui. and Dalel Kanzari.},
title={Distributed Intelligent Systems for Network Security Control},
booktitle={Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - ICSOFT-EA},
year={2016},
pages={348-352},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006009203480352},
isbn={978-989-758-194-6},
}

TY - CONF

JO - Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - ICSOFT-EA
TI - Distributed Intelligent Systems for Network Security Control
SN - 978-989-758-194-6
AU - Shili, M.
AU - Gharsellaoui, H.
AU - Kanzari, D.
PY - 2016
SP - 348
EP - 352
DO - 10.5220/0006009203480352
PB - SciTePress

<style> #socialicons>a span { top: 0px; left: -100%; -webkit-transition: all 0.3s ease; -moz-transition: all 0.3s ease-in-out; -o-transition: all 0.3s ease-in-out; -ms-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out;} #socialicons>ahover div{left: 0px;} </style>