Next: Problems
Up: Intrusion Detection 101
Previous: Architecture
- Autonomous agents
- peer-to-peer, distributed, intrusion-tolerant architecture
- Example systems
- Problems
- agents (and their communications) subject to attack - but cryptography can help
[RS98]
- practical deployment?
Dug Song
1999-09-17