Call for Paper - November 2023 Edition
IJCA solicits original research papers for the November 2023 Edition. Last date of manuscript submission is October 20, 2023. Read More

Agent based Decentralized and Fault Tolerant Intrusion Detection System

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 47 - Number 1
Year of Publication: 2012
Authors:
Arjun Singh
Surbhi Chauhan
Kamal Kant
Reshma Dokania
10.5120/7149-9850

Arjun Singh, Surbhi Chauhan, Kamal Kant and Reshma Dokania. Article: Agent based Decentralized and Fault Tolerant Intrusion Detection System. International Journal of Computer Applications 47(1):1-6, June 2012. Full text available. BibTeX

@article{key:article,
	author = {Arjun Singh and Surbhi Chauhan and Kamal Kant and Reshma Dokania},
	title = {Article: Agent based Decentralized and Fault Tolerant Intrusion Detection System},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {47},
	number = {1},
	pages = {1-6},
	month = {June},
	note = {Full text available}
}

Abstract

An intrusion detection system has become a standard component of security infrastructure. Mobile agents transportable in network, gather information, evaluate and guide the alarm to network administrator. Advantage of having the mobile agent based approach in IDS that there is no centralized failure, less latency rate of data transmission and it has real time capability to generate the alarm against the intrusion. Despite of having many number of advantages of agent based IDS, it have some challenges like security of agent from attacker and high time to detection. which need to address. This paper present Mobile Agent Based decentralized and Fault Tolerant Intrusion Detection System to detect user anomalies in windows environment. This paper focus on the protection of mobile agent from malicious host.

References

  • Adriano M. Cansian, Artur R. A. da Silva and Marcelo de Souza, "An Attack Signature Model to Computer Security Intrusion Detection", IEEE, pp: 1368-1373, 2002.
  • Balasubramaniyan. J, J. O. G. Fernandez, D. Isacoff, E. , H. Spafford, and D. Zamboni, " An Architecture for Intrusion Detection using Autonomous Agents", Technical report no. TR 98-05, Purdue University, USA, 1998.
  • Bernardes, M. C and dos Santos Moreira, E. , "Implementation of an intrusion detection system based on mobile agents", Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, pp. 158-164 June 2000.
  • Chan. P. C and Victor K. Wei, "Preemptive Distributed Intrusion Detection using Mobile Agents", Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02), 2002.
  • Debapriyay Mukhopadhyay and Satyajit Banerjee, "User Profiling for Host Based Anomaly Intrusion Detection in Windows NT", Emerging Applications Information Technology, pp. 193-196, 2006.
  • Guy Helmer, Johnny S. K . Wong, Vasant Honavar and Les Miller, "Automated discovery of concise predictive rules for intrusion detection", The Journal of Systems and Software, vol. 60, pp: 165–175, 2002.
  • Guy Helmer , Johnny S. K. Wong, Vasant Honavar, Les Miller and Yanxin Wang, "Lightweight agents for intrusion detection", The Journal of Systems and Software, vol. 67, pp: 109-122, 2003.
  • Gorodetski. V, and Kotenko, "The Multi-agent Systems for Computer Network Security Assurance: Frameworks and Case Studies", Proceedings of the 2002 IEEE International Conference on Artificial Intelligence Systems (ICAIS'02), 2002.
  • Jude Shavlik and Mark Shavlik, "Selection, Combination and Evaluation of Effective Software Sensor for Detecting Abnormal Computer Usage", Proceedings of the Tenth International Conference on Knowledge Discovery and Data Mining, pp. 276-285, 2004.
  • Kymie M. C. Tan and Roy A. Maxion, " Determining the Operational Limits of an Anomaly-Based Intrusion Detector", IEEE Journal on Selected Areas In Communications, vol. 21, 2003
  • Ozgur Depren, Murat Topallar, Emin Anarim, M. Kemal Ciliz, "An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks", Expert Systems with Applications, vol. 29, pp: 713–722, 2005.
  • Pradeep Kannadiga, M. Zulkernine, and S. Ahamed, "Towards an Intrusion Detection System for Pervasive Computing Environments", Proceedings of the International Conference on Information Technology (ITCC), Las Vegas, Nevada, USA, April 2005.
  • Pradeep Kannadiga and Mohammad Zulkernine, "DIDMA: A Distributed Intrusion Detection System Using Mobile Agents", Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks, 2005.
  • Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang, "Design and Implementation of a decentralized prototype system for detecting distributed attacks", IEEE Transactions on Computer Communications, vol. 25. pp: 1374-1391, 2002.
  • Jing Xu,Yongzhong Li " A New Distributed Intrusion Detection Model Based on immune Mobile Agent Proceedings of IEEE ,2009
  • Tao Peng , Christopher Leckie and Kotagiri Ramamohanarao , "Information Sharing for Distributed Intrusion Detection Systems", Journal of Network and Computer Applications, 2005.
  • Mo Xiu-liang, Wang Chun-dong ,Wang Huai-bin " A Distributed Intrusion Detection System Based on Mobile Agents"Proceeding in IEEE ,2009
  • Yoshinori Okazaki and Izuru Sato, "A New Intrusion Detection Method based on Process Profiling", Proceedings of the IEEE Symposium on Applications and the Internet, 2002.
  • Liu Jianxiao 1, Li Lijuan 1 "Research of Distributed Intrusion Detection System Model Based on Mobile Agent" Proceedings of IEEE International Forum on Information Technology and Application,2009
  • MO Xiu-liang, WANG Chun-dong , WANG Huai-bin"A Distributed Intrusion Detection System Based on Mobile Agents" Proceedings of IEEE,2009
  • Nita Patil, Chhaya Das, Shreya Patankar,Kshitija Pol "Analysis of Distributed Intrusion Detection Systems using Mobile Agents" Proceedings of IEEE First International Conference on Emerging Trends in Engineering and Technology ,2008
  • Saidat Adebukola Onashoga , Adebayo D. Akinde, Adesina Simon Sodiya " A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems" Proceeding of Issues in Informing Science and Information Technology Volume 6, 2009