Mobile Agent Based Intrusion Detection System Adopting Hidden Markov Model

Mobile agent based intrusion detection systems distribute detection agents to prevent system from shutting down when an agent becomes breaks. Because in this system agents are distributed, it can reduce network delay and network load, and each agent can operate independently. Agents can also be easily added or deleted. In this paper we propose an enhanced design of mobile agent based intrusion detection system using Hidden Markov Model algorithm for detection. Hidden Markov Model algorithm is used to detect abnormal behavior pattern by analyzing log information. By adopting this algorithm to the mobile intrusion detection agents, detection performance can be improved.

[1]  Hodjat Hamidi,et al.  Evaluation of fault-tolerant mobile agents in distributed systems , 2005 .

[2]  Martin Fleury,et al.  Secure Network Management Within an Open-Source Mobile Agent Framework , 2004, Journal of Network and Systems Management.

[3]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[4]  Wayne A. Jansen,et al.  Intrusion detection with mobile agents , 2002, Comput. Commun..

[5]  Eugene H. Spafford,et al.  An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[6]  Fei Gao,et al.  The prediction role of hidden Markov model in intrusion detection , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[7]  Peter Mell,et al.  Optimizing the Scalability of Network Intrusion Detection Systems Using Mobile Agents , 2004, Journal of Network and Systems Management.

[8]  J. C. Byington,et al.  Mobile agents and security , 1998, IEEE Commun. Mag..

[9]  Marie A. Wright Communication security in a distributed network , 1990, SGSC.

[10]  Wayne Jansen,et al.  Applying Mobile Agents to Intrusion Detection and Response , 1999 .

[11]  S.Y. Foo,et al.  Mobile agents for computer intrusion detection , 2004, Thirty-Sixth Southeastern Symposium on System Theory, 2004. Proceedings of the.