  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Intelligent Systems and Internet of Things</full_title>
  <abbrev_title>JISIoT</abbrev_title>
  <issn media_type="print">2690-6791</issn>
  <issn media_type="electronic">2769-786X</issn>
  <doi_data>
   <doi>10.54216/JISIoT</doi>
   <resource>https://www.americaspg.com/journals/show/2571</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>An adaptive distributed intrusion detection system in local network: Hybrid classification methods</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">PhD Student at the Department of Computer Networks and Systems, Faculty of Information Technology Engineering, Damascus University, Damascus, Syrian Arab Republic</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Amjad</given_name>
    <surname>Amjad</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Professor at Faculty of Information Technology Engineering, Damascus University, Damascus, Syrian Arab Republic</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Nizar</given_name>
    <surname>Alhafez</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Assistant professor at Faculty of Information Technology Engineering, Damascus University, Damascus, Syrian Arab Republic</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Iyad Al</given_name>
    <surname>Al-khayat</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>In the realm of cybersecurity, the incessant evolution of network attacks necessitates advanced and robust intrusion detection systems (IDS). The major issues with these systems are numerous: false positivenegative alarms, delayed response and detection time, size of processed data, adaptability to future threats, scalability of the system, difficulty in detecting distributed attacks, and downtime (fault tolerance). We propose a system that introduces a distributed framework aimed at enhancing network security by effectively identifying subtle deviations from normal network behavior. This is achieved through transfer learning based on artificial neural networks, and support vector machine (SVM), capitalizing on their complementary strengths in recognizing complex patterns and addressing high-dimensional datasets. To validate the efficacy of the proposed approach, the NSL-KDD dataset is utilized within a distributed IDS architecture. It consists of several intrusion detection nodes representing subnetworks. A node consists of two agents that work collaboratively. A way is proposed to avoid interference between analysis agents: the network agents manager monitors the functioning of the nodes and displays the results of each vulnerability-detecting node in each subnet separately. Such communication between agents should reduce FPAS (false positive alarms) significantly. The Detection engine extracts relevant features of network attacks to solve the problem of SVM in processing huge sizes of data and detect adaptive future threats to detect famous distributed denial of services (DDOS) attacks in real-time. The system is highly scalable by increasing the number of intrusion detection system nodes if necessary. Central processing is avoided to circumvent a system failure situation, where processing and decision-making take place at the detection node level within each subnet.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2024</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2024</year>
  </publication_date>
  <pages>
   <first_page>129</first_page>
   <last_page>143</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JISIoT.120110</doi>
   <resource>https://www.americaspg.com/articleinfo/18/show/2571</resource>
  </doi_data>
 </journal_article>
</journal>
