[1] J. P. Anderson, Computer Security Threat Monitoring and
Surveillance, James P. Anderson Company, Fort Washington,
Pennsylvania, (1980).
[2] M. Asaka, S. Okasawa, A. Taguchi and S. Goto, A Method of Tracing
Intruders by Use of Mobile Agents, Proceedings of the 9th Annual
Internetworking Conference (INET‘99), San Jose, California (June
1999).
[3] J. S. Balasubramaniyam, J. O. Garcia-Fernandez, D. Isacoff, E.
Spafford and D. Zamboni, An Architecture for Intrusion Detection Using
Autonomous Agents, Proceedings of the 14th Annual Computer Security
Applications Conference, (December 1998).
[4] F. A. Barika, Vers un IDS Intelligent Base d’Agents
Mobiles, Higher Institute of Management (July 2003).
[5] M. C. Bernardes and E. Dos Santos Moreira, Implementation of an
intrusion detection system based on mobile agents, International
Symposium on Software Engineering for Parallel and Distributed Systems
(June 2000), 158-164.
[6] M. Burdach, Hardening the TCP/IP Stack to SYN Attacks, Security
Focus, (September 2003).
[7] R. H. Campbell, Z. Liu, M. D. Mickunas, P. Naldurg and S. Yi,
Seraphim: An Active Security Architecture for Active Network,
UIUCDCS-R-99-2167, UILU-ENG-99-1756, Urbana, IL 61801 (November
1999).
[8] A. Cardon, A distributed multiagent system for the self-evaluation
of dialogs, Proceedings of the Joint JSAI 2001 Workshop on New
Frontiers in Artificial Intelligence, Springer-Verlag, (2001),
43-50.
[9] CISCO, www.cisco.com, Accessed March 2008.
[10] D. Curry and H. Debar, Intrusion Detection Message Exchange
Format Data Model and Extensible Markup Language (XML) Document Type
Definition, Intrusion Detection Working Group, (January 2003).
[11] N. Daira, Strorshield presentation, www.skyrecon.com, Accessed August 2008.
[12] D. Dasgupta, F. Gonzalez, K. Yallapu, J. Gomez and R.
Yarramsettii, CIDS: An agent based intrusion detection system,
Computers & Security 24(5) (2005), 387-398.
[13] K. Deeter, K. Singh, S. Wilson, L. Filipozzi and S. Vuong,
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection
System, Mobility Aware Technologies and Applications, LNCS, Springer,
Heidelberg 3284 (2004), 244-253.
[14] D. E. Denning, An intrusion detection model, IEEE Transactions on
Software Engineering, SE-13, (1987) 222-232.
[15] Dethy, Examining port scan methods-Analysing Audible Techniques,
synnergy.net/downloads
/papers/portscan.txt, Accessed April 2001.
[16] F. Dressler, G. Mnz and G. Carle, Attack Detection Using
Cooperating Autonomous Detection Systems (CATS),
Wilhelm-Schickard-Institute of Computer Science, Computer Networks and
Internet, University of Tbingen (2004).
[17] M. Eriksson, An Example of a Man-in-the-middle Attack Against
Server Authenticated SSL-sessions, International Conference on Applied
Cryptography and Network Security, (October 2003).
[18] Firestorm,www.scaramanga.co.uk, Accessed October
2007.
[19] K. Ghedira, MASC: une approche Multi-Agents de problèmes de
Statisfaction de Contraintes, (1993).
[20] L. Gong, Java Security Architecure, Java Soft (July 1997).
[21] T. L. Heberlein, G. V. Dias, K. N. Levitt, B. Mukherjee, J. Wood
and D. Wolber, A Network Security Monitor, Proceedings of the
Symposium on Research in Securirt and Privacy, (May 1990).
[22] I. M. Hegazy, T. Al-Arif, Z. T. Fayed and H. M. Faheem, A
Multi-agent Based System for Intrusion Detection, IEEE Potentials
22(4) (2003), 28-31.
[23] HPING, www.hping.org, Accessed November 2007.
[24] G. Hulmer, J. S. K. Wong, V. Honavar, L. Miller and Y. Wang,
Lightweight Agents for Intrusion Detection, Journal of Systems and
Software 67 (03) (2003), 109-122.
[25] W. Jansen, P. Mell, T. Karygiannis and D. Marks, Applying mobile
agents to intrusion detection and response, NIST Interim Report -
6416, (October 1999).
[26] N. EL Kadhi and P. Boury, Static analysis of Java Cryptographic
Applets, Proceedings of ECOOP2001 Workshop on Java Formal
Verification, Budapest, (June 2001).
[27] N. EL Kadhi, F. A. Barika, E. Burstein and K. Ghedira, Toward
Agent IDS: Agents Platforms Security Features Study, Proceedings of
CSC 2003, Computer security Congress, Mexique, March 2003.
[28] S. Kumar and E. Spafford, A Software Architecture to Support
Misuse Intrusion Detection, Department of Computer Sciences, Purdue
University, (March 1995).
[29] D. B. Lange and M. Oshima, Programming and Deploying Java Mobile
Agents with Aglets, Seconde Edition, ISBN 0-201-32582-9,
Massachusetts, Addison Wesley, 225 (1998).
[30] L. Me, Z. Marrakchi, C. Michel, H. Debar and F. Cuppens, La
detection d’intrusion: les outils doivent cooperer, REE
Journal, Revue de l’Electricite et de l’Electronique 5
(May 2001), 50-55.
[31] MonALISA, MONitoring Agents using a Large Integrated Services
Architecture, monalisa.cacr.caltech.edu, Accessed August
2008.
[32] B. Mukherjee, T. L. Heberlein and K. N. Levitt, Network Intrusion
Detection, IEEE Network, (June 1994).
[33] NMAP, www.insecure.org/nmap, Accessed November
2007.
[34] Palmquis, Intelligent Agents in Computer and Network Management,
Texas University, (course paper), 24 (1998).
[35] Prelude-IDS, www.prelude-ids.org, Accessed October
2007.
[36] T. H. Ptacek and T. N. Newsham, Insertion, evasion and denial of
service: Eluding network intrusion detection, Secure Network Inc.
(January 1998).
[37] De Queiroz, J. D. Da Costa Carmo, L. F. R. Pirmez and L. Micael,
An Autonomous mobile agent system to protect new generation networked
application, 2nd Annual Workshop on Recent Advances in Intrsuion
Detection, (September 1999).
[38] M. J. Ranum, Experiences Benchmarking Intrusion Detection
Systems, NFR Security, (December 2001).
[39] RealSecure, www.iss.net, Accessed March 2008.
[40] M. Rehk, M. Pechoucek, P. Celeda, J. Novotn and P. Minark,
CAMNEP: agent-based network intrusion detection system. Proceedings of
the 7th international Joint Conference on Autonomous Agents and
Multiagent Systems (2008), 133-136.
[41] R. U. Rehman, Intrusion Detection Systems with SNORT Advanced IDS
Techniques Using SNORT, Apache, MySQL, PHP, and ACID, Publishing as
Prentice Hall PTR Upper Saddle River, New Jersey 07458, ISBN
0-13-140733-3 (2003).
[42] F. S. Rietta, Application Layer Intrusion Detection for SQL
Injection, ACM SE06 1012. Melbourne, Florida, USA, (March 2006).
[43] M. Singh and S S. Sodhi, Distributed Intrusion Detection using
Aglet Mobile Agent Technology, Proceedings of National Conference on
Challenges & Opportunities in Information Technology (COIT-2007)
RIMT-IET, Gobindgarh, (March 2007).
[44] SNORT, www.snort.org, Accessed October 2007.
[45] E. H. Spafford and D. Zamboni, Intrusion Detection Using
Autonomous Agents, Computer Networks: The Int. Journal of Computer and
Telecommunications Networking 34(4) (2000), 547-570.
[46] S. Specht and R. Lee, Distributed Denial of Service: Taxonomies
of Attacks, Tools, and Countermeasures, Proceedings of the 17th
International Conference on Parallel and Distributed Computing
Systems, (September 2004) 543-550.
[47] Tamandua, tamandua.axur.org, Accessed October
2007.
[48] M. Tatsubori, An Extension Mechanism for the Java Language,
University of Tsukuba, (1999).
[49] The Aglets Software Development Kit, sourceforge.net, Accessed June 2002.
[50] A. Trapathi, T. Ahmed, S. Pathak, A. Pathak, M. Carney, M. Koka
and P. Dokas, Active Monotoring of Network System using Mobile Agents,
University of Minnesota, (May 2002).
[51] Tritheme Distributed and Hybrid Intrusion Detection and Response
System, sourceforge.net/projects/tritheme, Accessed
August 2007.
[52] G. Vigna, S. Eckmann and R. Kemmerer, Attack Languages, IEEE
Information Survivability Workshop, IEEE Computer Society Press,
Boston, MA, USA, (2000), 163-166.
[53] H. Q. Wang, Z. Q. Wang, Q. Zhao, G. F. Wang, R. J. Zheng and D.
X. Liu, Mobile Agents for Network Intrusion Resistance, APWeb 2006,
LNCS, Springer, Heidelberg 3842 (2006), 965-970.