A Survey on Mobile Agent based Intrusion Detection System

Intrusion detection system (IDS) is the security mechanism that gathers and analyzes the information to detect unwanted attempts of accessing and manipulating the user and system activities and report it to the management station. A Mobile agent (MA) is a composition of computer software and data which is able to migrate (move) from one computer to another autonomously and continue its execution on the destination computer. Taking the recent development i.e. going to this field, mobile agent based intrusion detection system is an efficient way to the intrusion detection in the distributed environment. This paper is a review paper and currently summarizes the current state of the mobile agent based intrusion detection system. We discuss the performance gain that occur using mobile agent on intrusion detection system and review the existing mobile agent based intrusion detection system[MAIDS] focusing on each of the categories of the classification, techniques used and the shortcomings of the current IDS design and implementations. Analyzing the existing [MA-IDS], we suggest some improvement that can be done in the existing system to avoid the malicious activities for the future security of the computer systems and the network.

[1]  Wendi Heinzelman,et al.  Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .

[2]  Amira Hamdi Shabaan,et al.  Intrusion detection system in wireless ad-hoc networks based on mobile agent technology , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[3]  Chundong Wang,et al.  A Distributed Intrusion Detection System Based on Mobile Agents , 2009, 2009 2nd International Conference on Biomedical Engineering and Informatics.

[4]  Jing Xu,et al.  A New Distributed Intrusion Detection Model Based on Immune Mobile Agent , 2009, 2009 Asia-Pacific Conference on Information Processing.

[5]  Henda Ben Ghezala,et al.  A distributed multi-level anomalies detection system using the mobile agent approach , 2009, 2009 Global Information Infrastructure Symposium.

[6]  Stefan Fünfrocken,et al.  Integrating Java-based mobile agents into Web servers under security concerns , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[7]  Abolfazl Esfandi Efficient anomaly intrusion detection system in adhoc networks by mobile agents , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[8]  Amitabh Mishra,et al.  Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.

[9]  Kang G. Shin,et al.  Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[10]  Wayne Jansen,et al.  Applying Mobile Agents to Intrusion Detection and Response , 1999 .

[11]  Stefan Axelsson,et al.  Intrusion Detection Systems: A Survey and Taxonomy , 2002 .

[12]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[13]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..

[14]  K. Ghedira,et al.  MA_IDS : Mobile Agents for Intrusion Detection System , 2009, 2009 IEEE International Advance Computing Conference.

[15]  Raman K. Mehra,et al.  Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks , 2008, Inf. Fusion.

[16]  Khaled Ghédira,et al.  Distributed Agent Architecture for Intrusion Detection Based on New Metrics , 2009, 2009 Third International Conference on Network and System Security.

[17]  Abolfazl Esfandi,et al.  Mobile agent security in multi agent environments using a multi agent-multi key approach , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[18]  K. Boudaoud,et al.  Détection d'intrusions : une nouvelle approche par systèmes multi-agents , 2001 .

[19]  A HofmeyrSteven,et al.  Intrusion detection using sequences of system calls , 1998 .

[20]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.