CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

SOC based Self Healing Architecture for Data Security

by S. Lakshmi Kantham, S. Ravi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 21
Year of Publication: 2013
Authors: S. Lakshmi Kantham, S. Ravi
10.5120/10757-5687

S. Lakshmi Kantham, S. Ravi . SOC based Self Healing Architecture for Data Security. International Journal of Computer Applications. 64, 21 ( February 2013), 11-16. DOI=10.5120/10757-5687

@article{ 10.5120/10757-5687,
author = { S. Lakshmi Kantham, S. Ravi },
title = { SOC based Self Healing Architecture for Data Security },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 21 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 11-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number21/10757-5687/ },
doi = { 10.5120/10757-5687 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:17:12.964702+05:30
%A S. Lakshmi Kantham
%A S. Ravi
%T SOC based Self Healing Architecture for Data Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 21
%P 11-16
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Protecting enterprises from hackers, viruses and other security vulnerabilities is a primary concern for all IT System. Since IT systems become more and more interconnected, they also become exposed to an increasing number of attacks. In order to develop high security systems, many have relied on intrusion detection and prevention systems (IDPSs) as a solution. In this paper, Host Based Distributed IDS with Multi Agent System (MAS) is proposed, where each node on the network will have an IDS agent runs independently and monitors network traffic, local activities, including user and systems activities, and communication activities. The IDS agents on each node in the network work together via a cooperative intrusion detection algorithm to decide when and how the network is being attacked.

References
  1. Moses Garuba, Intrusion Techniques: Comparative Study of Network Intrusion Detection Systems, 5th Internal Conference on Information Technology Pages 592-598 - 2008.
  2. Liwei Kuang and Mohammad Zulkernine, An Intrusion – Tolerant Mechanism for Intrusion Detection Systems. 3rd International Conference on Availability, Reliability and Security Pages 319-326, 2008.
  3. M. Rehak, M. echoucek and P. Celeda, Proc. Of 7th International conference on Autonomous Agents and Multiagent systems (AAMAS-2008) – Industry and Applictions Track, Berger, Burg,Nishiyama(eds). , May 12-16, 2008, Estoril, Portugal,pp. 133-136.
  4. Jin-Gang Cao, Gu-ping Zheng, Research on Distributed Instrusion Detection System Based on Mobile Agent, Proceeding of the 7th International Conference on Machine Learning and Cybernetics, Kunming, 12-15 July 2008.
  5. Jianxiao Liu, Lijuan Li, A Distributed Intrusion Detection System Based on Agents, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
  6. M. Syamala Devi and Manish Arora, Multi agent System for resource allocation and monitoring,African Journal of Mathematics and Computer Science Research Vol. 1(2), pp. 020-027, October, 2008
  7. Peng Liu and Jiwu Jing, Architecture for Self-Healing Database under Cyber Attacks, IJCSNS International Journal of Computer Science and Network Security, VOL 6 No. 1B, January 2006.
  8. Min Sheng, Jiandong Li and Yan shi, "Critical Nodes Detection in Mobile Ad-hoc Network", Proceeding of the 20th International Conference on Advanced Information Networking and Applications (AINA'06), IEEE Transaction 2006.
  9. G. Edward Suh, Jae W. Lee, Dravid Zhang, Srinivas Davadas, "Secure Program Execution via Dynamic Information Flow Tracking" ASPLOS'04, Boston, Massachusetts, USA, October 7-13, 2004.
  10. Hancock. D. L, Lamont. G. B "Multi-agent System for Network Attack Classification using Flow-Based Intrusion Detection: 2011 IEEE Transaction.
  11. Jia-Jun Xiong, Jing Zhang :A Kind of Multilayer Intrusion Detection System using Mobile Agent: 2003, IEEE Transaction.
  12. Chi-Ho Tsang, Kwong. S "Multi-agent Intrusion Detection System in Industrial Network using Ant Colony Clustering Approach and Unsupervised Feature Extraction" 2005 ICIT2005, IEEE Internation Conference on Computing & Processing, PP:51 - 56.
  13. Ye Du, Huigiang Wang, Yonggang Pang "Design and Implementation of Independent Agets – Based Distributed Intrusion Detection System" WCICA 2004, 5th IEEE conference on Intelligent Control and Automation, pp: 4343 - 4347
  14. Farhan. A. F, Zulkhairi. D, Hatim. M. T "Mobile Agent Intrusion Detection System for Mobile Ad Hoc Networks: A non-overlapping zone approach" ICI 2008, 4th IEEE/IFIP International Conference on Communication & Networking.
  15. F. A. Barika & N. E. Kadhi "Agent IDS based on Misuse Approach" Journal of Software Vol. 4 No. 6, August 2009.
  16. Sato. T. Fukase. M "Reconfigurable Hardware Implementation of Host-Based IDS: APCC2003, the 9th Asia-Pasific Conference on Communication, Networking and Broadcasting, PP : 849 - 853.
Index Terms

Computer Science
Information Sciences

Keywords

Distributed IDS Agent Multi Agent Systems Routing Intruder