CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Article:An Agent based Distributed Security System for Intrusion Detection in Computer Networks

by Arun Saxena, A.K.Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 3
Year of Publication: 2010
Authors: Arun Saxena, A.K.Sharma
10.5120/1659-2234

Arun Saxena, A.K.Sharma . Article:An Agent based Distributed Security System for Intrusion Detection in Computer Networks. International Journal of Computer Applications. 12, 3 ( December 2010), 18-27. DOI=10.5120/1659-2234

@article{ 10.5120/1659-2234,
author = { Arun Saxena, A.K.Sharma },
title = { Article:An Agent based Distributed Security System for Intrusion Detection in Computer Networks },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 12 },
number = { 3 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 18-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume12/number3/1659-2234/ },
doi = { 10.5120/1659-2234 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:00:44.147904+05:30
%A Arun Saxena
%A A.K.Sharma
%T Article:An Agent based Distributed Security System for Intrusion Detection in Computer Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 12
%N 3
%P 18-27
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Intruders damage or steal valuable information by either bypassing security tools or penetrating through them, necessitating the need to detect such intrusion attempts especially in case of multi-event based distributed attacks spanning over a considerable amount of time. In this paper ecology of agents is being suggested that uses class hierarchy to define complex intrusions. The source and target containers produced thereof are analyzed for possible intrusion attempts thereby rendering the proposed system self-monitoring, robust, secure and reliable.

References
  1. Przemyslaw Kazeinko, and Piotr Dorosz (April 2003). Intrusion Detection Systems Part I- (network intrusions; attack symptoms; ids tasks; and ids architecture.http://www.windowsecurity.com/articles/Intrusion_detection_Systems_IDS_PartI_network_intusions_attack_symptoms_IDS_tasks_and_IDS_architecture.html.
  2. Michael Karwaski. 2009. Efficiently Deducing IDS False Positives Using System Profiling. SANS Institute InfoSec Reading Room.
  3. Rafael Paez, and Miguel Torres. 2009. Laocoonte: An Agent Based Intrusion Detection System. International Symposium On Collaborative Technologies And Systems, pp. 217-224.
  4. Shreeraj Shah. 2008.Hacking Web Services. Second Indian Reprint. Delmar Cengage Learning, pp. 95-105.
  5. Amir Vahid Dastjerdi, Kamalrulnizam Abu Bakar. 2008. A Novel Mobile Agent Based Distributed Intrusion Detection System. World Acdemy of Scienec. Engineering and Technology 45 2008.
  6. Mohamad Eid, Hassan Artail, Ayman Kayssi, Ali Chehab. March 2008.LAMAIDS-A Lightweight Adaptive Mobile Agent Based Intrusion Detection System. International Journal of Network Security. Vol. 6, No.2, pp. 145-157.
  7. Abdoul Karim Ganame, Julien Bourgeois, Renaud Bidou, Francois Spies. 2008. A Global Security Architecture For Intrusion Detection On Computer Networks, Computers And Security. Vol. 27, pp.30-47.
  8. H.Q. Wang, Z.Q.Wang, Q. Zhao, G.F. Wang, R.J. Zheng, D.X. Liu. 2006. Mobile Agents For Network Intrusion Resistance; Springer. LNCS. vol. 3842/2006, pp. 965-970.
  9. Xiaodong Zhu, Zhiqiu Huang, Hang Zhou. August 2006. Design of a Multi-Agent Based intelligent Intrusion Detection System. First International Symposium on Pervasive Computing and Applications, pp. 290-295.
  10. Nicholas Ianelli, Aaron Hackworth. December 1, 2005. Botnets as a vehicle for online crime. CERT Coordination Center.
  11. Mohamad Eid, Hassan Artail, Ayman Kayssi, Ali Chehab. November 2005. Trends in Mobile Agent Application, Journal of Research And Practice In Information Technology. Vol.37, no.4.
  12. Ahmed Shaaban Abdel Shah, Imane Aly Saroit Ismail, S.H.Ahmed. December 2005. IDSUDA-An Intrusion Detection System Using Distributed Agents. CNIR Journal. Vol. 5, no. 1, pp.1-11.
  13. Richard A. Wasniwoski. September 23-24, 2005. MSABIDS-Multi-Sensor Based Agent-Based Intrusion Detection System. Information Security Curriculum Development Conference, pp. 100-103.
  14. Cheung-Leung Lui, Tak-Chung Fu, Ting-Lee Cheung. July 2005. Agent-Based Network Intrusion Detection System, in Proc. of the Third International Conference on Information Technology and Applications. Vol.1, pp.131-136, Sydney.
  15. K. Deeter, K. Singh, S. Wilson, L. Filipozzi, S. Wong. 2004.APHIDS- A Mobile Agent Based Programmable Hybrid Intrusion Detection. springer LNCS. vol. 3284/2004, pp.244-253.
  16. Mohamad Eid, Hassan Artail, Ayman Kayssi, Ali Chehab. October 2004. An Adaptive Intrusion Detection And Defense System Based On Mobile Agents, in Proceedings of the innovations in information technology. Dubai, UAE.
  17. Guy Helmer, Johnny S. K. Wong, Vasant Hanover, Les Miller, Yanxin Wang. 2003. Lightweight Agents For Intrusion Detection, The Journal Of Systems And Software. Vol. 67,pp. 109-122.
  18. A. F. Barika, N. El-Kadhi. November 2003. Intelligent and Mobile Agent For Intrusion Detection System. Proceedings of international conference of information and communication technology.
  19. P. Ning, S. Jajodia, X.S. Wang. September 2002. Design and implementation of a decentralized prototype system for detecting distributed attacks. Compu Communication. vol 25, issue 15, pp. 1374-1391.
  20. C. Kruegel, T. Toth. 2001. Applying Mobile Agent Technology to Intrusion Detection. Procedings of the ICSE for workshop on software engineering and mobility. pp. 1841-2002.
  21. G. Vigna, R. A. Kemmerer. 1999. NetSTAT: a network based intrusion detection system. Journal of Computer Security. Vol. 7, no. 1, pp. 37-71.
  22. S.R. Snapp, J. Bretano, G. V. Diaz, T. L. Goan, T. L. Heberlein, C. Ho, K. N. Levitt, B. Mukherjee, S.E. Smaha, T. Grance, D. M. Teal, D. Mansur. October 1999. DIDS (Distributed Intrusion Detection System)-motivation architecture and an early prototype. Proceedings of the 14th national computer security conference. pp. 167-176, Washington, DC.
  23. S. Staniford-Chen, S. B. Tung, D. Schnackenberg. Oct 1998. The Common Intrusion Detection Framework (CIDF). Proceedings of the Information Survivability Workshop. Orlando FL.
  24. Jai Sundar Balasubramaniyan, Jose Omar Garcia-Fernandez, David Isacoff, Eugene Spafford and Diego Zamboni. DC December 1998. An Architecture For Intrusion Detection Using Autonomous Agents, 14th IEEE Computer Security Applications Conference ACSAC. pp. 13-24, Washington.
  25. P. A. Porras and V. G. Neumann. 1997. EMERALD: event monitoring enabling response to anomalous live disturbances. Proceedings of the 20th National Information Security Conference, NIST. pp. 353-365.
  26. R. A. Kemmerer. 1997. NSTAT: a model based real-time intrusion detection system. Technical report TRCS97-18, Reliable Software Group, Department Of Computer Science, University of California at Santa Barbara, CA, USA.
  27. S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yipi, D. Z. Erkle. 1996. GriDS: a large scale intrusion detection system for large networks. Proceedings of the 19th national information security conference. pp. 361-370.
  28. M. Crosbie and G. Spafford. Feb 1995. Active Defense Of A Computer System Using Autonomous Agents. Technical Report 95-008, COAST GROUP, Department Of Computer Sciences, Perdue University, West Lafayette, IN 47907-1398.
  29. A. Moijini , B. L. Charlier, D. Zampunieris, N. Habra. 1995. Distributed Audit Trail Analysis. Proceedings of the ISOC 95 Symposium on Network and Distributed System Security. pp. 102-112.
  30. B. Mukherjee, T .L. Heberlein, and K. N. Levitt. May/June 1994. Network Intrusion Detection. IEEE Network Magazine. Vol. 8, no. 3, pp.26-41.
  31. D. E. Denning. Feb. 1987. A Intrusion-Detection Model. IEEE Transactions on software Engineering. Vol. 13, no. 2, pp. 222-232.
  32. J. P. Anderson. April 1980. Computer Security Threat Monitoring and Surveillance. Technical Report, James P. Anderson Co., Fort Washington, PA.
Index Terms

Computer Science
Information Sciences

Keywords

Agents Agent Based Intrusion Detection System Distributed Intrusion Detection System Network Security