CFP last date
20 May 2024
Reseach Article

A Survey on Mobile Agent based Intrusion Detection System

Published on None 2011 by Shiv Shakti Srivastava, Nitin Gupta, Saurabh Chaturvedi, Saugata Ghosh
International Symposium on Devices MEMS, Intelligent Systems & Communication
Foundation of Computer Science USA
ISDMISC - Number 6
None 2011
Authors: Shiv Shakti Srivastava, Nitin Gupta, Saurabh Chaturvedi, Saugata Ghosh
c5d85e48-ccaf-45e5-ae13-4cd233f67688

Shiv Shakti Srivastava, Nitin Gupta, Saurabh Chaturvedi, Saugata Ghosh . A Survey on Mobile Agent based Intrusion Detection System. International Symposium on Devices MEMS, Intelligent Systems & Communication. ISDMISC, 6 (None 2011), 19-24.

@article{
author = { Shiv Shakti Srivastava, Nitin Gupta, Saurabh Chaturvedi, Saugata Ghosh },
title = { A Survey on Mobile Agent based Intrusion Detection System },
journal = { International Symposium on Devices MEMS, Intelligent Systems & Communication },
issue_date = { None 2011 },
volume = { ISDMISC },
number = { 6 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 19-24 },
numpages = 6,
url = { /proceedings/isdmisc/number6/3481-isdm137/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Symposium on Devices MEMS, Intelligent Systems & Communication
%A Shiv Shakti Srivastava
%A Nitin Gupta
%A Saurabh Chaturvedi
%A Saugata Ghosh
%T A Survey on Mobile Agent based Intrusion Detection System
%J International Symposium on Devices MEMS, Intelligent Systems & Communication
%@ 0975-8887
%V ISDMISC
%N 6
%P 19-24
%D 2011
%I International Journal of Computer Applications
Abstract

Intrusion detection system (IDS) is the security mechanism that gathers and analyzes the information to detect unwanted attempts of accessing and manipulating the user and system activities and report it to the management station. A Mobile agent (MA) is a composition of computer software and data which is able to migrate (move) from one computer to another autonomously and continue its execution on the destination computer. Taking the recent development i.e. going to this field, mobile agent based intrusion detection system is an efficient way to the intrusion detection in the distributed environment. This paper is a review paper and currently summarizes the current state of the mobile agent based intrusion detection system. We discuss the performance gain that occur using mobile agent on intrusion detection system and review the existing mobile agent based intrusion detection system[MA-IDS] focusing on each of the categories of the classification, techniques used and the shortcomings of the current IDS design and implementations. Analyzing the existing [MA-IDS], we suggest some improvement that can be done in the existing system to avoid the malicious activities for the future security of the computer systems and the network.

References
  1. Amitabh Mishra, Ketan Nadkarni, and Animesh Patcha,Virginia Tech Intrusion Detection in Wireless Ad Hoc Networks', IEEE Wireless Communications, February 2004,pp. 48-60.
  2. K. Boudaoud,“Détection d'intrusions : une nouvelle approach par systems multiagents”, Thèse EPFL, 2000.
  3. F.A. Barika, N. El Kadhi,K. Ghedira,MA_IDS: Mobile Agents for Intrusion Detection System, Advance Computing Conference, 2009. IACC 2009. IEEE International, DOI: 10.1109/IADCC.2009.4809135
  4. Palmquis, Intelligent Agents in Computer and Network Management, http://www.gslis.utexas.edu/ palmquis/courses, 1998.
  5. Farah Barika KTATA,Nabil KADHI,Khaled GHEDIRA,Distributed agent architecture for intrusion detection based on new metrics,NSS 09,The Third International Conference,doi:10.1109/NSS.2009.50
  6. Amira Hamdi Shabaan,Hesham ElZouka,Mohamed Abou ElNasr,Intrusion Detection System in Wireless Ad-hoc Networks Based on Mobile Agent Technology, Computer Engineering and Technology (ICCET), 2010 2nd International Conference.Doi: 10.1109/ICCET.2010.5486031
  7. J. Macker and S. Corson. Mobile ad-hoc networking (manet): Routing protocol performance issues and evaluation considerations. University of Maryland, Network Working Group Request for Comments:2501, Jan 1999.
  8. Wendi Rbiner Heinzelman, Anantha Chandrakasan, and Henri Balakrishnan,"Energy-E_cient Communication Protocol for Wireless Microsensor Networks", Published in The proceedings of the Hawaii International Conference on System Sciences, January 2000.
  9. Abolfazl Esfandi, Efficient anomaly intrusion detection system in adhoc networks by mobile agents, Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference,DOI: 10.1109/ICCSIT.2010.5563804
  10. Intrusion-Detection. http://en.wikipedia.org/wiki/intrusiondetection,2010
  11. Jo1
  12. o B. D. Cabrera, Carlos Gutierrez , Raman K. Mehra ,"Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks", Volume 9 , Issue I (January 2008) table of contents, Pages 96-119 , Elsevier Science Publishers, 2008.
  13. Abolfazl Esfandi, Ali Movaghar Rahimabadi, "Mobile Agent Security in Multi agent Environments Using a Multi agent-Multi key Approach", in Proc. 2nd IEEE International Conference on Computer Science and Information Technology, Vol. 4, August 2009, pp. 438- 442.
  14. HPING, http://www.hping.org,2010
  15. Jing Xu, Yongzhong Li,A New Distributed Intrusion Detection Model Based on Immune Mobile Agent, Issued in APCIP2009,Doi: 10.1109/APCIP.2009.249.
  16. S. Axelsson, “Intrusion detection systems: a survey and taxonomy”, Technical Report No 99-15, Chalmers University of Technology, Sweden
  17. S.A. Hofmeyr, S. Forrest, and A. Somayaji, “Intrusion detection using sequences of system calls”, in Journal of Computer Security, Vol. 6,1998, pp. 151-180.
  18. J. Kim and P. Bentley. “Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection”, in Proc. of the Congress on Evolutionary Computation, Honolulu,USA, 2002, pp. 1015-1020.
  19. Fakher Ben Ftima,Wiem Tounsi,Kamel Karoui,henda Ben Ghezala, Distributed Multilevel Anomalies Detection System Using the Mobile Agent Approach,Doi: 10.1109/GIIS.2009.5307046
  20. J.P.Gaulier, “Etude et definition des differentes attaques de scan et de deni de service”, origamix, 2006.
  21. H. Wang, D. Zhang and K.G.Shin, “Detecting SYN Flooding Attacks”, EECS Department, The University of Michigan, 2002.
  22. Mo Xiu-Liang,WANG Chun-Dong,WANG Huai-bin,” A Distributed Intrusion Detection System Based on Mobile Agents”, BMEI '09,DOI: 10.1109/BMEI.2009.5305477.
  23. Wayne Jansen, Peter Mell, Tom Karygiannis, Don Marks. “Applying Mobile Agents to Intrusion Detection and Response”, NIST Interim Report (IR) - 6416. ACM October 1999.
  24. Stefan Fuenfrocken. “Integrating Java-based Mobile Agents into Web Servers under Security Concerns”, Technical Report, Department of Computer Science, Darmstadt University of Technology, Alexanderstr. 6, 64283 Darmstadt, Germany.
  25. Stefan Fuenfrocken. “Integrating Java-based Mobile Agents into Web Servers under Security Concerns”, Technical Report, Department of Computer Science, Darmstadt University of Technology, Alexanderstr. 6, 64283 Darmstadt, Germany.
  26. The main website of Win dump: www.tcpdump.org (Accessed in January 10, 2004).
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion detection system (IDS) Mobile agent (MA)