TITLE

DEVELOPING MOBILE AGENT FOR INTRUSION DETECTION

AUTHOR(S)
Sugiantoro, Bambang; Wardoyo, Retantyo; Hartati, Sri; Istiyanto, Jazi Eko
PUB. DATE
April 2013
SOURCE
International Journal of Computer Science & Information Technolo;Apr2013, Vol. 5 Issue 2, p121
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Mobile agent is a certain agent actively able to move from one computer to another or even travel across network to perform the task assigned. This research aimed to develop mobile agent model to detect distributed intrusion (Distributed Intrusion Detection System). It was expected that the produced model was able to perform its task in nearly real time manner, to be immune against attack, and also fairly small overhead at the host, either in memory consumption or CPU usage. In this research, the Aglets concept was also developed to aid intrusion detection. This approach was also maintained to solve certain issues such as scalability, reliability, and configurability. Hence, the advantages and limitations of agent-based approaches will be when it is applied in real world.
ACCESSION #
88086434

 

Related Articles

  • A Mobile Agent Approach for IDS in Mobile Ad Hoc Network. EL MOURABIT, YOUSEF; TOUMANARI, AHMED; ZOUGAGH, HICHAM // International Journal of Computer Science Issues (IJCSI);Jan2014, Vol. 11 Issue 1, p148 

    Mobile Ad Hoc Networks are a group of wireless computers, forming a communication network, that have no predetermined structure. It's highly vulnerable to attacks due to the open medium dynamically changing network topology, co-operative algorithm, lack of centralized. The fact that security is...

  • Intrusion Detection System Designed for Wireless using JADE Mobile Agent Framework. Sasikumar, R.; Manjula, D. // International Journal of Computer Applications;7/15/2012, Vol. 50, p23 

    In wireless environment the system allows the end users to use the application without installation and access their personal files at any computer with internet access. Apart from the advantages of wireless network, security is the major issue. Due to the distributed nature, wireless...

  • An Enhanced Multi-Agent based Network Intrusion Detection System using Shadow Log. Singh, Namita; Krishan, Siddharth; Singh, Uday Kumar // International Journal of Computer Applications;Aug2014, Vol. 100, p1 

    The capability of agent and its distributed problem solving nature makes it useful and powerful; such that it can be utilized in various fields. Various research [1][2][3][4][5][6] has been done and currently in progress based on the utilization of the capability of the agents. Here our focus is...

  • High-quality attack graph-based IDS correlation. Roschke, Sebastian; Cheng, Feng; Meinel, Christoph // Logic Journal of the IGPL;Aug2013, Vol. 21 Issue 4, p571 

    Intrusion Detection Systems are widely deployed in computer networks. As modern attacks are getting more sophisticated and the number of sensors and network nodes grow, the problem of false positives and alert analysis becomes more difficult to solve. Alert correlation was proposed to analyse...

  • Distributed Approach of Intrusion Detection System: Survey. Richariya, Vineet; Singh, Uday Pratap; Mishra, Renu // International Journal of Advanced Computer Research;Dec2012, Vol. 2 Issue 6, p358 

    Intrusion Detection Systems (IDS) are now becoming one of burning issue for any organization's network. Intruders always search for vulnerabilities or flaws in target system and attack using different techniques. An intrusion detection system (IDS) is needed to detect and respond effectively...

  • Mobile Agent Applications within Intrusion Detection Technology. Verma, Nisha; Kumar, Anjani // International Journal of Advanced Research in Computer Science;May2011, Vol. 2 Issue 3, p81 

    Intrusion detection system (IDS), based on mobile agents, that detects intrusion from outside the network segment as well as from inside. Mobile agent technology offers a new computing paradigm in which a program, in the form of a software agent, can suspend its execution on a host computer,...

  • New Distributed Methodology for Intrusion Detection Based on Multi-Agents System at Two Levels. Raoui, D.; Benhadou, S.; Medromi, H. // International Review on Computers & Software;May2010, Vol. 5 Issue 3, p298 

    The development and evolution of computer networks, in terms of number of users and services, are making them more complex and therefore vulnerable to new types of attacks. Given this complexity of attacks, intrusion detection systems, to monitor the activities of a network or a sensitive...

  • FUSIÓN Y CORRELACIÓN DE ALERTAS BASADAS EN ONTOLOGÍAS SOBRE SISTEMAS MULTI-AGENTES. ISAZA ECHEVERRY, GUSTAVO; CASTILLO OSSA, LUIS FERNANDO // Gerencia Tecnologica Informatica;may-ago2013, Vol. 12 Issue 33, p67 

    Attacks Detection systems evaluate traffic attacks or intrusions from a default signature sets to identify potential abnormal behaviors, however, these techniques are insufficient if the sequence of events does not correspond to any of the previously recognized patterns. The use of honeynet aims...

  • An Agent-Based Intrusion Detection System for Local Area Networks. Sen, Jaydip // International Journal of Communication Networks & Information Se;Jun2010, Vol. 2 Issue 2, p128 

    Since it is impossible to predict and identify all the vulnerabilities of a network beforehand, and penetration into a system by malicious intruders cannot always be prevented, intrusion detection systems (IDSs) are essential entities to ensure the security of a networked system. To be effective...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics