Multi-level and Secured Agent-based Intrusion Detection System

Sodiya, Adesina Simon
September 2006
Journal of Computing & Information Technology;Sep2006, Vol. 14 Issue 3, p217
Academic Journal
Since Intrusion Detection System (IDS) has become necessary security tool for detecting attacks on computer network and resources, it is essential to improve previous designs. Recently many mobile agent-based IDSs have been designed, but there are still some drawbacks. Some of these drawbacks are low detection efficiency, high false alarm rate and agent security. A multi-level and secured IDS architecture based on mobile agent is presented in this work to correct these drawbacks. In order to make the design more efficient, the architecture is improved in such a way that intrusion detection at the lower level and the confirmation of intrusion detected take place at the upper level. The design also incorporates data mining strategy in the identification of intrusive actions. Implementing the new design using JAVA shows a better performance than previous designs.


Related Articles

  • ALARM EDUCATION.  // SDM: Security Distributing & Marketing;Apr2000, Vol. 30 Issue 5, p37 

    Focuses on the New Orleans Police Department and the Louisiana Burglar and Fire Alarm Association's collaboration on a false alarm education effort in Louisiana. Emphasis on alarm users and dealers; Failure of an alarm ordinance to reach its goal of a reduction in the false alarm rate; Effort...

  • Intrusion battleground evolves. Yocom, Betsy; Brown, Kevin // Network World;10/8/2001, Vol. 18 Issue 41, p53 

    Focuses on the intrusion detection system in hybrids of network-and server-based products and price fall. Details on the encrypted connection of host-based systems; Analysis of data ID system; Need to filter out false-positive alarms.

  • An Adaptive Approach to Granular Real-Time Anomaly Detection. Chin-Tser Huang; Janies, Jeff // EURASIP Journal on Advances in Signal Processing;2009, Special section p1 

    Anomaly-based intrusion detection systems have the ability to detect novel attacks, but when applied in real-time detection, they face the challenges of producing many false alarms and failing to match with the high speed of modern networks due to their computationally demanding algorithms. In...

  • Police Chiefs Receive Alarm Management Award.  // SDM: Security Distributing & Marketing;Oct2005, Vol. 35 Issue 10, p19 

    Reports on the presentation of the Security Industry Alarm Coalition Director's Award to the leadership of the Georgia Association of Chiefs of Police during the chiefs' annual 2005 conference in Savannah, Georgia. Recognition of police chiefs for their outstanding leadership in addressing the...

  • OzVision Provides Technology for Video Verification Module.  // SDM: Security Distributing & Marketing;Oct2005, Vol. 35 Issue 10, p33 

    Reports that OzVision has collaborated with Honeywell Inc. to provide the technology for its event-driven video verification module. Features of Honeywell's V4000 remote video system; Potential of the system to reduce false alarms.

  • Development and Implementation of Intelligent Video Surveillance Alarm System. Ruogu Zhou; Feng Ding; Li Lu // Information Technology Journal;Jul2011, Vol. 10 Issue 7, p1295 

    There exist many deficiencies in current video surveillance system such as high expenditure, information omitting, data analysis difficulty, long response. This study proposes a design scheme of intelligent alarm system with the main technology of motion detection, image compression and WEB...

  • DMP Receives UL Classification.  // SDM: Security Distributing & Marketing;Oct2005, Vol. 35 Issue 10, p27 

    Reports that Springfield, Missouri-based Digital Monitoring Products Inc. has received an Underwriters Laboratories (UL)-approved classification for ANSI/SIA CP-01-2000 False Alarm Reduction. Products included with the UL approval; Coverage of the classification.

  • Move up into the Top Third. Stepanek, Laura // SDM: Security Distributing & Marketing;Oct2008, Vol. 38 Issue 10, p13 

    The author reflects on the concept of alarm management in the U.S. She asserts that non-response policies whether aimed at burglar alarms or fire detection systems go against the effort of the security industry. She appeals to the Americans to help the security sector on alarm management...

  • Intrusion Detection Management System for eCommerce Security. G√≥mez, Jorge Marx; Lichtenberg, Jens // Journal of Information Privacy & Security;2007, Vol. 3 Issue 4, p19 

    This paper introduces the idea of an intrusion detection management system to enhance the security of eCommerce systems. An intrusion Management System applies different Intrusion Detection Systems (IDS) to not only detect a threat but also analyze it and propose counter measures to avoid...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics