Multi-Level and Secured Agent-Based Intrusion Detection System

Since Intrusion Detection System (IDS) has become necessary security tool for detecting attacks on computer network and resources, it is therefore essential to improve on previous designs. In past, many mobile agent-based IDSs have been designed, but there still exists some drawbacks. Some of these drawbacks are low detection efficiency, high false alarm rate and agent security. A multi-level and secured IDS architecture that is based on mobile agent is presented on this work to correct these drawbacks. Implementing the new design using JAVA shows a better performance over previous designs.

[1]  Eugene H. Spafford,et al.  An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[2]  Leonid Sheremetov,et al.  Weiss, Gerhard. Multiagent Systems a Modern Approach to Distributed Artificial Intelligence , 2009 .

[3]  Wayne Jansen,et al.  Applying Mobile Agents to Intrusion Detection and Response , 1999 .

[4]  Luci Pirmez,et al.  Micael: An Autonomous Mobile Agent System to Protect New Generation Networked Applications , 1999, Recent Advances in Intrusion Detection.

[5]  Adesina Simon Sodiya,et al.  A new two-tiered strategy to intrusion detection , 2004, Inf. Manag. Comput. Secur..

[6]  Ken Deeter Aphids : a mobile agent-based programmable hybrid intrusion detection and analysis system , 2004 .

[7]  Jeffrey M. Bradshaw,et al.  An introduction to software agents , 1997 .

[8]  Salvatore J. Stolfo,et al.  JAM: Java Agents for Meta-Learning over Distributed Databases , 1997, KDD.

[9]  Regina Dunlea,et al.  Simple Object Access Protocol (SOAP) , 2005 .

[10]  Christopher Krügel,et al.  Applying Mobile Agent Technology to Intrusion Detection , 2001 .

[11]  Christopher Krügel,et al.  SPARTA A Mobile Agent based Intrusion Detection System , 2001 .

[12]  Vasant Honavar,et al.  Towards the automatic generation of mobile agents for distributed intrusion detection system , 2006, J. Syst. Softw..

[13]  Adesina Simon Sodiya,et al.  An improved two-tiered strategy to intrusion detection , 2005, Inf. Manag. Comput. Security.

[14]  Vasant Honavar,et al.  Lightweight agents for intrusion detection , 2003, J. Syst. Softw..

[15]  Salvatore J. Stolfo,et al.  Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.

[16]  Guillermo Ricardo Simari,et al.  Multiagent systems: a modern approach to distributed artificial intelligence , 2000 .

[17]  M. Asaka,et al.  A method of tracing intruders by use of mobile agents , 1999 .