An intrusion detection system framework using mobile agents is a layered framework mechanism designed to support heterogeneous network environments to identify intruders at its best. Traditional computer misuse detection techniques can identify known attacks efficiently, but perform very poorly in other cases. Anomaly detection has the potential to detect unknown attacks; however, it is a very challenging task since its aim is to detect unknown attacks without any priori knowledge about specific intrusions. This technology is still at its early stage. The objective of this paper is that the system can detect anomalous user activity. Existing research in this area focuses either on user activity or on program operation but not on both simultaneously. In this paper, an attempt to look at both concurrently is presented. Based on an intrusion detection framework [1], a novel user anomaly detection system has been implemented and conducted several intrusion detection experiments in a simulated environment by analyzing user activity and program operation activities. The proposed framework is a layered framework, which is designed to satisfy the core purpose of IDS, and allows detecting the intrusion as quickly as possible with available data using mobile agents. This framework was mainly designed to provide security for the network using mobile agent mechanisms to add mobility features to monitor the user processes from different computational systems. The experimental results have shown that the system can detect anomalous user activity effectively.
[1]
Salvatore J. Stolfo,et al.
A framework for constructing features and models for intrusion detection systems
,
2000,
TSEC.
[2]
Barak A. Pearlmutter,et al.
Detecting intrusions using system calls: alternative data models
,
1999,
Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[3]
Yan Zhang,et al.
A safe mobile agent system for distributed intrusion detection
,
2003,
Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).
[4]
Edson dos Santos Moreira,et al.
Implementation of an intrusion detection system based on mobile agents
,
2000,
2000 Proceedings International Symposium on Software Engineering for Parallel and Distributed Systems.
[5]
Ray Hunt,et al.
Intrusion detection techniques and approaches
,
2002,
Comput. Commun..
[6]
Daniel J. Ragsdale,et al.
A hybrid approach to the profile creation and intrusion detection
,
2001,
Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[7]
Yuxin Ding,et al.
Host-based intrusion detection using dynamic and static behavioral models
,
2003,
Pattern Recognit..
[8]
Won Suk Lee,et al.
An anomaly intrusion detection method by clustering normal user behavior
,
2003,
Comput. Secur..
[9]
Wayne A. Jansen,et al.
Intrusion detection with mobile agents
,
2002,
Comput. Commun..