Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Intrusion Detection System Designed for Wireless using JADE Mobile Agent Framework

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 50 - Number 15
Year of Publication: 2012
Authors:
R. Sasikumar
D. Manjula
10.5120/7848-1084

R Sasikumar and D Manjula. Article: Intrusion Detection System Designed for Wireless using JADE Mobile Agent Framework. International Journal of Computer Applications 50(15):23-27, July 2012. Full text available. BibTeX

@article{key:article,
	author = {R. Sasikumar and D. Manjula},
	title = {Article: Intrusion Detection System Designed for Wireless using JADE Mobile Agent Framework},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {50},
	number = {15},
	pages = {23-27},
	month = {July},
	note = {Full text available}
}

Abstract

In wireless environment the system allows the end users to use the application without installation and access their personal files at any computer with internet access. Apart from the advantages of wireless network, security is the major issue. Due to the distributed nature, wireless environment is an easy target for intruders looking for the possible attacks to exploit. To address the security issues in the wireless environment an Intrusion Detection System (IDS) is proposed based on the features of the mobile agent. The mobile agents are used to collect and analyze the data collected from wireless network to identify attacks exploited by the intruders.

References

  • Imen Brahmi, Sadok Ben Yahia, and Pascal Poncelete, Vol 6122, pp:73-76, June 2010. "MAD-IDS: Novel Intrusion Detection System using Mobile Agents and Data Mining approaches" in Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2010.
  • Ani Taggu, Amar Taggu, pp: 1-4, January 2011 "TraceGray: An Application layer scheme for intrusion detection in MANET using Mobile agents" in Third International Conference on Communication Systems and Networks.
  • Esfandi. Vol 7, pp:73-77, July 2010. A, "Efficient anomaly intrusion detection system in Ad-hoc networks by Mobile Agents" in Third IEEE International Conference on Computer Science and Information Technology.
  • Yinan Li, Zhihong Qian, pp: 145-148, March 2010. "Mobile agents based intrusion detection system for mobile Ad-hoc network" in International Conference on Innovative Computing and Communication.
  • N. Jaisankar, R. Saravanan, K. Duraisamy, Vol 1, No 2, July 2009. "Intelligent intrusion detection system framework using mobile agents" in International Journal of Network Security and its Applications.
  • Jin-Gang-Cao, Gu-Ping-Zheng, Vol 3, pp: 1394-1399, July 2008. "Research on distributed intrusion detection system based on mobile agents" in Seventh International Conference on Machine Learning and Cybermatics.
  • Ugur Akyazi, pp: 1-6, October 2008. A. Sima Etaner Uyar, "Distributed Intrusion detection using mobile agents against DDoS attacks" in 23rd International Symposium on Computer and Information Sciences.
  • Manmeet Singh, S. S Sodhi, pp: 148-153, March 2007. "Distributed intrusion Detection using Aglet Mobile agent technology" in Proceedings of National Conference and Opportunities in Information Technology (COIT).
  • Vojtech Krmicek, Pavel Celeda, Martin Rehak, Michael Pechoucek, pp: 528-531, August 2007. "Agent based network intrusion detection system" in International Conference on Intelligent Agent Technology.
  • Bin-Dong, Xiu-Ling-Liu, Vol 6, August 2007. "An improved intrusion detection system based on agents" in Sixth International Conference on Machine Learning and Cybermatics.
  • W. A. Jansen, Vol: 15, pp: 1392-1401, July 2002. "Intrusion Detection with Mobile Agents", in Computer communication,.
  • Mell P, Karygiannis T, W. Jansen, pp: 1-12, June 2000. "Mobile Agents in Intrusion Detection and Response", in proceedings of the 12th annual Canadian Information Technology Security Symposium.
  • Kleber Vieira, Alexander Schulter, Carlos Becker Westphall, Carla Merkle Westphall, vol 2, Issue 4, pp:38-43, August 2010 . "Intrusion Detection for Grid and Wireless Computing" in IT professional sponsored by Computer Society of India.
  • D. E. Denning, vol 13, Issue 2, pp:222-232, 1987. "An Intrusion Detection Model", in IEEE transactions on Software Engineering.