PRANITA JAIN1*, SANDEEP RAGHUWANSHI2*, PATERIA R.K.3*
1Department of Computer Science & Engineering, MANIT, Bhopal, India
2Department of Computer Science & Engineering, MANIT, Bhopal, India
3Department of Computer Science & Engineering, MANIT, Bhopal, India
* Corresponding Author : r_k_pateriya@indiatimes.com
Received : - Accepted : - Published : 01-11-2011
Volume : 1 Issue : 1 Pages : 1 - 4
Int J Wireless Comm 1.1 (2011):1-4
Keywords : Mobile Agents, Intrusion Detection, Distributed Systems
Conflict of Interest : None declared
This paper presents various distributed intrusion detection system (IDS), based on mobile agents, that detects intrusion from outside the network segment as well as from inside. Mobile agents are intelligent agents that can migrate among hosts. They can execute tasks autonomously in dynamic environments. Besides general definitions of these IDS system architectures, it includes an overview of several Network and Agent Based Intrusion Detection systems .The system shows a superior performance compared to central sniffing IDS techniques, and saves network resources compared to other distributed IDSs. The proposed model comprises three major components: The Network Intrusion Detection Component, the Mobile Agent Platform, and distributed sensors residing on every device in the network segment.
[1] G. B. White, E. A. Fisch, and U. W. Pooch.
Cooperating security managers: A peerbased
intrusion detection system. IEEE
Network, pages 20–23, January/ February
1996
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[2] C. Krugel and T. Toth. A survey on intrusion
detection systems. Technical Report TUV-
1841-00-11, University of Technology,
Vienna, 2000
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[3] P. A. Porras and P. G. Neumann. Emerald:
Event monitoring enabling responses to
anomalous live disturbances. In
Proceedings of the 20th National
Information Systems Security Conference,
October 1997
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[4] X. Wang, J. Zheng, K. Xiao, X. Xue, and C.
Toh. A mobile agent-based p2p model for
autonomous security hole discovery. In
Proceedings of the Fifth International
Conference on Computer and Information
Technology, pages 723ñ727, 2005.
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[5] C. Krugel and T. Toth. Sparta - a security
policy reinforcement tool for large networks.
In submitted to I-NetSec 01, 2001
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[6] Li, C., Song, Q., Zhang, C.: Ma-ids
architecture for distributed intrusion
detection using mobile agents. In:
Proceedings of the 2nd International
Conference on Information Technology for
Application (ICITA 2004), 2004
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[7] W. Jansen and T. Karygiannis. Mobile
agents and security. Special Publication
800-19, NIST, 1999
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[8] Duarte de Queiroz, J., Fernando Rust da
Costa Carmo, L., Pirmez, L.: Micael: An
autonomous mobile agent system to protect
new generation networked applications. In:
2nd Annual Workshop on Recent Advances
in Intrusion Detection, 1999
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus