Immune Mobile Agent and Its Application in Intrusion Detection System

In current distributed intrusion detection systems, the data is collected mostly using distributed component to collect data sent for processing center. Data is analyzed in the processing center. Nevertheless, these models have the following problems: bad real time capability, bottleneck, and single point of failure. In addition, because of the low detecting speed and high false positive rate of traditional intrusion detection system. In order to overcome these shortcomings of current intrusion detection techniques, we have constructed an immune agent by combining immune system with mobile agent. a new distributed intrusion detection model based on mobile agent is proposed in this paper. Intelligent and mobile characteristics of the agent are used to make computing move to data. Analysis shows that the network load can be reduced and the real time capability of the system can be improved with the new model. The system is robust and fault-tolerant. Because mobile agent only can improve the structure of system, dynamic clonal selection algorithm is adopted for reducing false positive rate. The simulation results on KDD99 data set prove that the new model has low false positive rate and high detection rate.

[1]  W. Hunteman Automated Information System (AIS) Alarm System , 1997 .

[2]  B. Noble,et al.  On certain integrals of Lipschitz-Hankel type involving products of bessel functions , 1955, Philosophical Transactions of the Royal Society of London. Series A, Mathematical and Physical Sciences.

[3]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..

[4]  Julie Greensmith,et al.  Immune system approaches to intrusion detection – a review , 2004, Natural Computing.

[5]  Stephanie Forrest,et al.  A Machine Learning Evaluation of an Artificial Immune System , 2005, Evolutionary Computation.

[6]  Anneli Folkesson Computer networks 3 , 2013 .

[7]  Peter G. Neumann,et al.  EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.

[8]  M. A. Maarof,et al.  Feature Selection Using Rough Set in Intrusion Detection , 2006, TENCON 2006 - 2006 IEEE Region 10 Conference.

[9]  Eugene H. Spafford,et al.  Intrusion detection using autonomous agents , 2000, Comput. Networks.

[10]  Byung-Joo Kim,et al.  Kernel based intrusion detection system , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).

[11]  Hu Mingzeng,et al.  A novel distributed intrusion detection model based on mobile agent , 2004, InfoSecu '04.

[12]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[13]  Julie Greensmith,et al.  Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.