Gtk gnutella no results9/28/2023 ![]() Our research investigates the potential for a self-organizing anomaly detection system inspired by those observed naturally in colonies of honey bees. These methods have the unusual and useful ability to detect anomalies rapidly, with very little memory, and using only very local information. P2P-AIS implements Chord as a distributed hash table (DHT) protocol to organize the peers.ĪbstrAct Social insect colonies have survived over evolutionary time in part due to the success of their collaborative methods: using local information and distributed decision making algorithms to detect and exploit critical resources in their environment. In this paper we propose P2P-AIS, a P2P approach for AISes in which peers exchange intrusion detection experience in order to enhance attack detection and mitigation. Although several AISes have been proposed, only a few make use of collaborative approaches. An artificial immune system (AIS) is capable of detecting novel attacks because it is trained to differentiate between the normal behavior (self) and the abnormal behavior (non-self) during a tolerization (i.e training) period. This inspired researchers to build artificial immune systems (AISes) which imitate the behavior of the HIS and are capable of protecting hosts or networks from attacks. It acts as an intrusion detection and prevention system (IDPS) for the human body and detects anomalies that make the body deviate from its normal behavior. The human immune system (HIS) plays an important role in protecting the human body from various intruders ranging from naive germs to the most sophisticated viruses. Hence, the overall detection rate increases which ultimately increases the functional efficiency of the network to an acceptable level. Conclusion/Application: The proposed algorithm efficiently reduces the false positives, thus the detection rate of intrusions is increased. Results: Simulation results show that the proposed method not only has adaptability, scalability, flexibility and variety but also has high accuracy and correctness. Each time an attack is identified, a new generation is added to the detectors dataset to detect the intrusions. The proposed system uses an algorithm based on anomaly and signature-based detection mapped to AIS called “Generation of Detector (Genetic Algorithm)” to detect DDoS attacks. ![]() Methods/Statistical analysis: An IDS to detect DDoS attacks by simulating Artificial Immune System (AIS) is herein proposed. Due to Gnutella’s dependence on a central unit, the program is vulnerable to security breaches. Gnutella is a Peer to-Peer (P2P) networking model that currently provides decentralized file sharing capabilities to its users but the distinction between server and client is pale. As networks grow in size and speed, efficient scalable techniques should be available for IDSs. Intrusion Detection Systems (IDSs) have become a key component in ensuring the safety of systems and networks. Distributed Denial of Service (DDoS) attacks are an increasing threat to the Internet community.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |