It is possible to apply some of learning concepts developed over the last ten years in the areas of swarm intelligence, agent systems, and distributed control to the design of sophisticated swarm worms in such a way that true emergent behavior takes place. Swarm intelligence is a branch of artificial intelligence based on the collective behavior of the systems, decentralized and self-organized. The swarm intelligence systems typically consist of simple agents interacting with each other and their environment. The agents follow basic rules and, although there is no control structure that dictates the behavior of each one of them, local interactions between agents leads to the emergence of complex global behavior. The application of the principles of swarm robots is called swarm robotics, while the term swarm intelligence refers to the general set of algorithms.
Preventive measures taken to the relevant threats head offer. A firewall prevents unauthorized access to a network and is a preventive measure. Threats can manifest as a preventive measure fails or if an accepted risk but an incident to result. Detective measures to ensure recognition of an incident. An audit is a detective measure, like a smoke alarm. Also, AN ID is a detective measure. Then there must exist measures aimed for consequential damage can restrict the normal situation recover. This repression and recovery measures put in motion by detection of an incident. Early detection followed by effective response can prevent much damage. The goal is the time between the beginning of an incident and the time of intervention so as to reduce the damage is avoided. Finally, based on an assessment given to how the incident could have occurred and what measures may need adjusting. An IDS itself is responding to a limited role in the whole chain of security.
The current techniques being developed in the design of Intrusion Detection & Countermeasure Systems and Survivable systems effective against this new class of worms. An intrusion detection system (IDS) is a system for suspicious network traffic detects the internal network. It may include traffic that is not the fire- wall blocked, or traffic that the firewall is never passed. An IDS therefore connected to the internal network, and continuous network traffic eavesdrops and analyze.
Intrusion detection, detecting electronic intruders, a valuable complement the security measures for the corporate network. Betting an intrusion detection system (IDS) has quite a few feet into the earth. Survival services are ...