CFP last date
22 April 2024
Reseach Article

An Enhanced Multi-Agent based Network Intrusion Detection System using Shadow Log

by Namita Singh, Siddharth Krishan, Uday Kumar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 100 - Number 9
Year of Publication: 2014
Authors: Namita Singh, Siddharth Krishan, Uday Kumar Singh
10.5120/17550-8146

Namita Singh, Siddharth Krishan, Uday Kumar Singh . An Enhanced Multi-Agent based Network Intrusion Detection System using Shadow Log. International Journal of Computer Applications. 100, 9 ( August 2014), 1-5. DOI=10.5120/17550-8146

@article{ 10.5120/17550-8146,
author = { Namita Singh, Siddharth Krishan, Uday Kumar Singh },
title = { An Enhanced Multi-Agent based Network Intrusion Detection System using Shadow Log },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 100 },
number = { 9 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume100/number9/17550-8146/ },
doi = { 10.5120/17550-8146 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:29:29.663854+05:30
%A Namita Singh
%A Siddharth Krishan
%A Uday Kumar Singh
%T An Enhanced Multi-Agent based Network Intrusion Detection System using Shadow Log
%J International Journal of Computer Applications
%@ 0975-8887
%V 100
%N 9
%P 1-5
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The capability of agent and its distributed problem solving nature makes it useful and powerful; such that it can be utilized in various fields. Various research [1][2][3][4][5][6] has been done and currently in progress based on the utilization of the capability of the agents. Here our focus is on utilization of agent capability for identifying intrusion in network. Some agent based model and framework has been also produced for network intrusion detection system (NIDS)[5][6]. This paper includes a study on theory research an enhanced model based on shadow log.

References
  1. Wooldridge, M. An introduction to Multi agent system. Wiley Ed. (2002).
  2. Jeffrey M. Bradshaw, ?An Introduction to Software Agents, In Jeffrey M. Bradshaw, editor, Software Agents, chapter 1. AAAI Press/The MIT Press, 1997.
  3. Jones Anita K, Sielken Robert S. : Computer System Intrusion Detection: A Survey. University of Virginia, USA 19–20.
  4. Andreas Fuchsberger, ?Intrusion Detection Systems and Intrusion Prevention Systems?; Information Security Group, Royal Holloway, University of London, Egham, Surrey TW200EX, United Kingdom 2005.
  5. Chandrabhan Singh, Sanjay Sachan and Mohit Gangwar. Article: MAS based Selection and Composition Process of SWS's for Medical Health Care Planning System. International Journal of Computer Applications 60(16):40-44, December 2012. Published by Foundation of Computer Science, New York, USA.
  6. Munish Gupta, Manish Saxena, Vijay Kumar Mishra, Chandrabhan Singh "MAS BASED FRAMEWORK FOR NETWORK INTRUSION DETECTION SYSTEM", International Journal of Computer science & Communication Network (IJCSCN), volume 2 (6), 677-680, ISSN: 2249-5789.
  7. Alankar Srivastava, Shruti Saxena and Chandrabhan Singh. Article: Ontological Description and MAS based Composition Process of SWS's for Recruitment Domain. International Journal of Computer Applications 64(19):42-47, February 2013. Published by Foundation of Computer Science, New York, USA.
  8. Helmer, G. , Wong, J. S. K. , Honavar, V. G. , Miller, L. : Automated Discovery of Concise Predictive Rules for Intrusion Detection. Journal of Systems and Software 60(3), 165–175 (2002).
  9. Reilly, M. , Stillman, M. : Open Infrastructure for Scalable Intrusion Detection. In: IEEE Information Technology Conference, pp. 129–133 (1998).
  10. Spafford, E. H. , Zamboni, D. : Intrusion Detection Using Autonomous Agents. Computer Networks: The International Journal of Computer and Telecommunications Networking 34(4), 547–570 (2000).
  11. Stolfo, S. , Prodromidis, A. L. , Tselepis, S. , Lee, W. , Fan, D. W. , Chan, P. K. : JAM: Java Agents for Meta-Learning over Distributed Databases. In: Third International Conference on Knowledge Discovery and Data Mining, pp. 74–81 (1997).
  12. Walsh, W. E. , Wellman, M. P. : A market protocol for distributed task allocation. In: In Third International Conference on Multiagent Systems, Paris (1998).
  13. M. Bernardes, E. Moreira. Implementation of an Intrusion Detection System Based on Mobile Agents. Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 2000.
Index Terms

Computer Science
Information Sciences

Keywords

MAS (Multi Agent based System) NIDS (Network Intrusion Detection System) Shadow Log.