Improving the Efficiency of IDPS by Using Hybrid Methods from Artificial Intelligence
Title | Improving the Efficiency of IDPS by Using Hybrid Methods from Artificial Intelligence |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Tsochev, Georgi, Trifonov, Roumen, Yoshinov, Radoslav, Manolov, Slavcho, Pavlova, Galya |
Conference Name | 2019 International Conference on Information Technologies (InfoTech) |
ISBN Number | 978-1-7281-3274-7 |
Keywords | artificial intelligence, artificial intelligence security, composability, compositionality, Computational Intelligence, Computational modeling, computer network security, computer networks security, cryptography, cyber defense, Fuzzy logic, hybrid methods, intrusion detection system, Intrusion Detection Systems, intrusion prevention system, IP networks, Monitoring, multi-agent systems, multiagent systems, network and information security, Optimization, pubcrawl, reinforcement learning, security |
Abstract | The present paper describes some of the results obtained in the Faculty of Computer Systems and Technology at Technical University of Sofia in the implementation of project related to the application of intelligent methods for increasing the security in computer networks. Also is made a survey about existing hybrid methods, which are using several artificial intelligent methods for cyber defense. The paper introduces a model for intrusion detection systems where multi agent systems are the bases and artificial intelligence are applicable by the means simple real-time models constructed in laboratory environment. |
URL | https://ieeexplore.ieee.org/document/8860895 |
DOI | 10.1109/InfoTech.2019.8860895 |
Citation Key | tsochev_improving_2019 |
- intrusion detection system
- security
- Reinforcement learning
- pubcrawl
- optimization
- network and information security
- multiagent systems
- multi-agent systems
- Monitoring
- IP networks
- intrusion prevention system
- Intrusion Detection Systems
- artificial intelligence security
- hybrid methods
- Fuzzy logic
- cyber defense
- Cryptography
- computer networks security
- computer network security
- Computational modeling
- computational intelligence
- Compositionality
- composability
- Artificial Intelligence