CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Agent based Decentralized and Fault Tolerant Intrusion Detection System

by Arjun Singh, Surbhi Chauhan, Kamal Kant, Reshma Dokania
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 47 - Number 1
Year of Publication: 2012
Authors: Arjun Singh, Surbhi Chauhan, Kamal Kant, Reshma Dokania
10.5120/7149-9850

Arjun Singh, Surbhi Chauhan, Kamal Kant, Reshma Dokania . Agent based Decentralized and Fault Tolerant Intrusion Detection System. International Journal of Computer Applications. 47, 1 ( June 2012), 1-6. DOI=10.5120/7149-9850

@article{ 10.5120/7149-9850,
author = { Arjun Singh, Surbhi Chauhan, Kamal Kant, Reshma Dokania },
title = { Agent based Decentralized and Fault Tolerant Intrusion Detection System },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 47 },
number = { 1 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume47/number1/7149-9850/ },
doi = { 10.5120/7149-9850 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:40:45.140981+05:30
%A Arjun Singh
%A Surbhi Chauhan
%A Kamal Kant
%A Reshma Dokania
%T Agent based Decentralized and Fault Tolerant Intrusion Detection System
%J International Journal of Computer Applications
%@ 0975-8887
%V 47
%N 1
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An intrusion detection system has become a standard component of security infrastructure. Mobile agents transportable in network, gather information, evaluate and guide the alarm to network administrator. Advantage of having the mobile agent based approach in IDS that there is no centralized failure, less latency rate of data transmission and it has real time capability to generate the alarm against the intrusion. Despite of having many number of advantages of agent based IDS, it have some challenges like security of agent from attacker and high time to detection. which need to address. This paper present Mobile Agent Based decentralized and Fault Tolerant Intrusion Detection System to detect user anomalies in windows environment. This paper focus on the protection of mobile agent from malicious host.

References
  1. Adriano M. Cansian, Artur R. A. da Silva and Marcelo de Souza, "An Attack Signature Model to Computer Security Intrusion Detection", IEEE, pp: 1368-1373, 2002.
  2. Balasubramaniyan. J, J. O. G. Fernandez, D. Isacoff, E. , H. Spafford, and D. Zamboni, " An Architecture for Intrusion Detection using Autonomous Agents", Technical report no. TR 98-05, Purdue University, USA, 1998.
  3. Bernardes, M. C and dos Santos Moreira, E. , "Implementation of an intrusion detection system based on mobile agents", Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, pp. 158-164 June 2000.
  4. Chan. P. C and Victor K. Wei, "Preemptive Distributed Intrusion Detection using Mobile Agents", Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02), 2002.
  5. Debapriyay Mukhopadhyay and Satyajit Banerjee, "User Profiling for Host Based Anomaly Intrusion Detection in Windows NT", Emerging Applications Information Technology, pp. 193-196, 2006.
  6. Guy Helmer, Johnny S. K . Wong, Vasant Honavar and Les Miller, "Automated discovery of concise predictive rules for intrusion detection", The Journal of Systems and Software, vol. 60, pp: 165–175, 2002.
  7. Guy Helmer , Johnny S. K. Wong, Vasant Honavar, Les Miller and Yanxin Wang, "Lightweight agents for intrusion detection", The Journal of Systems and Software, vol. 67, pp: 109-122, 2003.
  8. Gorodetski. V, and Kotenko, "The Multi-agent Systems for Computer Network Security Assurance: Frameworks and Case Studies", Proceedings of the 2002 IEEE International Conference on Artificial Intelligence Systems (ICAIS'02), 2002.
  9. Jude Shavlik and Mark Shavlik, "Selection, Combination and Evaluation of Effective Software Sensor for Detecting Abnormal Computer Usage", Proceedings of the Tenth International Conference on Knowledge Discovery and Data Mining, pp. 276-285, 2004.
  10. Kymie M. C. Tan and Roy A. Maxion, " Determining the Operational Limits of an Anomaly-Based Intrusion Detector", IEEE Journal on Selected Areas In Communications, vol. 21, 2003
  11. Ozgur Depren, Murat Topallar, Emin Anarim, M. Kemal Ciliz, "An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks", Expert Systems with Applications, vol. 29, pp: 713–722, 2005.
  12. Pradeep Kannadiga, M. Zulkernine, and S. Ahamed, "Towards an Intrusion Detection System for Pervasive Computing Environments", Proceedings of the International Conference on Information Technology (ITCC), Las Vegas, Nevada, USA, April 2005.
  13. Pradeep Kannadiga and Mohammad Zulkernine, "DIDMA: A Distributed Intrusion Detection System Using Mobile Agents", Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks, 2005.
  14. Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang, "Design and Implementation of a decentralized prototype system for detecting distributed attacks", IEEE Transactions on Computer Communications, vol. 25. pp: 1374-1391, 2002.
  15. Jing Xu,Yongzhong Li " A New Distributed Intrusion Detection Model Based on immune Mobile Agent Proceedings of IEEE ,2009
  16. Tao Peng , Christopher Leckie and Kotagiri Ramamohanarao , "Information Sharing for Distributed Intrusion Detection Systems", Journal of Network and Computer Applications, 2005.
  17. Mo Xiu-liang, Wang Chun-dong ,Wang Huai-bin " A Distributed Intrusion Detection System Based on Mobile Agents"Proceeding in IEEE ,2009
  18. Yoshinori Okazaki and Izuru Sato, "A New Intrusion Detection Method based on Process Profiling", Proceedings of the IEEE Symposium on Applications and the Internet, 2002.
  19. Liu Jianxiao 1, Li Lijuan 1 "Research of Distributed Intrusion Detection System Model Based on Mobile Agent" Proceedings of IEEE International Forum on Information Technology and Application,2009
  20. MO Xiu-liang, WANG Chun-dong , WANG Huai-bin"A Distributed Intrusion Detection System Based on Mobile Agents" Proceedings of IEEE,2009
  21. Nita Patil, Chhaya Das, Shreya Patankar,Kshitija Pol "Analysis of Distributed Intrusion Detection Systems using Mobile Agents" Proceedings of IEEE First International Conference on Emerging Trends in Engineering and Technology ,2008
  22. Saidat Adebukola Onashoga , Adebayo D. Akinde, Adesina Simon Sodiya " A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems" Proceeding of Issues in Informing Science and Information Technology Volume 6, 2009
Index Terms

Computer Science
Information Sciences

Keywords

Machine Learning Data Mining Intrusion Detection System (ids) Denial Of Service (dos)