CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Intrusion Detection System Designed for Wireless using JADE Mobile Agent Framework

by R. Sasikumar, D. Manjula
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 50 - Number 15
Year of Publication: 2012
Authors: R. Sasikumar, D. Manjula
10.5120/7848-1084

R. Sasikumar, D. Manjula . Intrusion Detection System Designed for Wireless using JADE Mobile Agent Framework. International Journal of Computer Applications. 50, 15 ( July 2012), 23-27. DOI=10.5120/7848-1084

@article{ 10.5120/7848-1084,
author = { R. Sasikumar, D. Manjula },
title = { Intrusion Detection System Designed for Wireless using JADE Mobile Agent Framework },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 50 },
number = { 15 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume50/number15/7848-1084/ },
doi = { 10.5120/7848-1084 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:48:23.081430+05:30
%A R. Sasikumar
%A D. Manjula
%T Intrusion Detection System Designed for Wireless using JADE Mobile Agent Framework
%J International Journal of Computer Applications
%@ 0975-8887
%V 50
%N 15
%P 23-27
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In wireless environment the system allows the end users to use the application without installation and access their personal files at any computer with internet access. Apart from the advantages of wireless network, security is the major issue. Due to the distributed nature, wireless environment is an easy target for intruders looking for the possible attacks to exploit. To address the security issues in the wireless environment an Intrusion Detection System (IDS) is proposed based on the features of the mobile agent. The mobile agents are used to collect and analyze the data collected from wireless network to identify attacks exploited by the intruders.

References
  1. Imen Brahmi, Sadok Ben Yahia, and Pascal Poncelete, Vol 6122, pp:73-76, June 2010. "MAD-IDS: Novel Intrusion Detection System using Mobile Agents and Data Mining approaches" in Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2010.
  2. Ani Taggu, Amar Taggu, pp: 1-4, January 2011 "TraceGray: An Application layer scheme for intrusion detection in MANET using Mobile agents" in Third International Conference on Communication Systems and Networks.
  3. Esfandi. Vol 7, pp:73-77, July 2010. A, "Efficient anomaly intrusion detection system in Ad-hoc networks by Mobile Agents" in Third IEEE International Conference on Computer Science and Information Technology.
  4. Yinan Li, Zhihong Qian, pp: 145-148, March 2010. "Mobile agents based intrusion detection system for mobile Ad-hoc network" in International Conference on Innovative Computing and Communication.
  5. N. Jaisankar, R. Saravanan, K. Duraisamy, Vol 1, No 2, July 2009. "Intelligent intrusion detection system framework using mobile agents" in International Journal of Network Security and its Applications.
  6. Jin-Gang-Cao, Gu-Ping-Zheng, Vol 3, pp: 1394-1399, July 2008. "Research on distributed intrusion detection system based on mobile agents" in Seventh International Conference on Machine Learning and Cybermatics.
  7. Ugur Akyazi, pp: 1-6, October 2008. A. Sima Etaner Uyar, "Distributed Intrusion detection using mobile agents against DDoS attacks" in 23rd International Symposium on Computer and Information Sciences.
  8. Manmeet Singh, S. S Sodhi, pp: 148-153, March 2007. "Distributed intrusion Detection using Aglet Mobile agent technology" in Proceedings of National Conference and Opportunities in Information Technology (COIT).
  9. Vojtech Krmicek, Pavel Celeda, Martin Rehak, Michael Pechoucek, pp: 528-531, August 2007. "Agent based network intrusion detection system" in International Conference on Intelligent Agent Technology.
  10. Bin-Dong, Xiu-Ling-Liu, Vol 6, August 2007. "An improved intrusion detection system based on agents" in Sixth International Conference on Machine Learning and Cybermatics.
  11. W. A. Jansen, Vol: 15, pp: 1392-1401, July 2002. "Intrusion Detection with Mobile Agents", in Computer communication,.
  12. Mell P, Karygiannis T, W. Jansen, pp: 1-12, June 2000. "Mobile Agents in Intrusion Detection and Response", in proceedings of the 12th annual Canadian Information Technology Security Symposium.
  13. Kleber Vieira, Alexander Schulter, Carlos Becker Westphall, Carla Merkle Westphall, vol 2, Issue 4, pp:38-43, August 2010 . "Intrusion Detection for Grid and Wireless Computing" in IT professional sponsored by Computer Society of India.
  14. D. E. Denning, vol 13, Issue 2, pp:222-232, 1987. "An Intrusion Detection Model", in IEEE transactions on Software Engineering.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless computing Intrusion Detection System Mobile agent intruders