We elaborated an architecture of intrusion detection based in SMA. Are there simulators for simulating attacks before proceeding to implementation in JADE?
For me, it depends on what type of intrusion detection and what attacks can it detect ? If the attacks are break-ins, penetrations or other forms of computer abuse, you need to study their behavior and then build the corresponding model. The simulator will be done in building model.
Thank you for your answer, how can we model the agents in detection intrusion model, you can offer me a starting point ? ie the practice to follow to model my architecture ?
In my opinion, It depends on your design of IDSs system (Intrucsion Dectection Systems). I advise you read the paper "Multiagent Systems for Network Intrusion Detection: A Review" to know how multiagent systems are applied for the development of IDSs