Improving Performance of Mobile Agent Based Intrusion Detection System

From the last decade, Mobile Agent has been extensively used to detect distributed attack in the computer networks. However, literature survey of existing mobile agent based intrusion detection systems clearly shows poor response time and large agent size as major challenges. In this paper, we discussed reasons and solutions for these challenges. We had verified these solutions on computer network having 1400 systems by performing various experiments using Jade Agent Platform. Our experiments clearly show that our solutions reduce response time and agent size to a great extent.

[1]  Bhushan H. Trivedi,et al.  Reducing Features of KDD CUP 1999 Dataset for Anomaly Detection Using Back Propagation Neural Network , 2015, 2015 Fifth International Conference on Advanced Computing & Communication Technologies.

[2]  Salvatore J. Stolfo,et al.  Anomalous Payload-Based Worm Detection and Signature Generation , 2005, RAID.

[3]  Yoshihiro Oyama,et al.  Anomaly-Based Intrusion Detection System Sharing Normal Behavior Databases among Different Machines , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.

[4]  Jerzy W. Rozenblit,et al.  A hybrid intrusion detection and visualization system , 2006, 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06).

[5]  Christopher Krügel,et al.  Anomaly detection of web-based attacks , 2003, CCS '03.

[6]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.

[7]  Eugene H. Spafford,et al.  Intrusion detection using autonomous agents , 2000, Comput. Networks.

[8]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[9]  Raouf Boutaba,et al.  Applying kernel methods to anomaly based intrusion detection systems , 2009, 2009 Global Information Infrastructure Symposium.

[10]  Hassan Artail,et al.  A New Mobile Agent-Based Intrusion Detection System Using Distributed Sensors , 2004 .

[11]  Eugene H. Spafford,et al.  An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[12]  Sung Deok Cha,et al.  Masquerade detection based on SVM and sequence-based user commands profile , 2007, ASIACCS '07.

[13]  U. Akyazi,et al.  Distributed intrusion detection using mobile agents against DDoS attacks , 2008, 2008 23rd International Symposium on Computer and Information Sciences.

[14]  Lu Song-nian Research of distributed intrusion detection system based on mobile agent , 2006 .

[15]  Boleslaw K. Szymanski,et al.  Intrusion detection: a bioinformatics approach , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[16]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[17]  Jianxiao Liu,et al.  A Distributed Intrusion Detection System Based on Agents , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[18]  Adesina Simon Sodiya,et al.  Multi-Level and Secured Agent-Based Intrusion Detection System , 2006, J. Comput. Inf. Technol..

[19]  Pieter H. Hartel,et al.  POSEIDON: a 2-tier anomaly-based network intrusion detection system , 2006, Fourth IEEE International Workshop on Information Assurance (IWIA'06).

[20]  H. Javitz,et al.  Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System ( NIDES ) 1 , 1997 .

[21]  Chundong Wang,et al.  A Distributed Intrusion Detection System Based on Mobile Agents , 2009, 2009 2nd International Conference on Biomedical Engineering and Informatics.

[22]  Emin Anarim,et al.  An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..

[23]  Jing Xu,et al.  A New Distributed Intrusion Detection Model Based on Immune Mobile Agent , 2009, 2009 Asia-Pacific Conference on Information Processing.

[24]  S. E. Smaha Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[25]  R. J. Zheng,et al.  Mobile Agents for Network Intrusion Resistance , 2006, APWeb Workshops.

[26]  Chhaya Das,et al.  Analysis of Distributed Intrusion Detection Systems Using Mobile Agents , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[27]  A. Chehab,et al.  An Adaptive Intrusion Detection and Defense System based on Mobile Agents , 2004 .

[28]  Eugene H. Spafford,et al.  An Application of Pattern Matching in Intrusion Detection , 1994 .

[29]  Richard A. Kemmerer,et al.  State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..

[30]  Yingbing Yu,et al.  A survey of anomaly intrusion detection techniques , 2012 .

[31]  H. S. Teng,et al.  Adaptive real-time anomaly detection using inductively generated sequential patterns , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[32]  Jing Xu,et al.  Immune Mobile Agent and Its Application in IDS , 2013 .

[33]  B. Djemaa,et al.  Intrusion detection system: Hybrid approach based mobile agent , 2012, International Conference on Education and e-Learning Innovations.

[34]  Chengqi Zhang,et al.  MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agent , 2004 .

[35]  Christopher Krügel,et al.  Flexible, Mobile Agent Based Intrusion Detection for Dynamic Networks , 2001 .

[36]  Bhavin Shah,et al.  Artificial Neural Network based Intrusion Detection System: A Survey , 2012 .

[37]  Gunar E. Liepins,et al.  Detection of anomalous computer session activity , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[38]  Koral Ilgun,et al.  USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[39]  Christopher Krügel,et al.  Applying Mobile Agent Technology to Intrusion Detection , 2001 .