Distributed Approach of Intrusion Detection System : Survey

Intrusion Detection Systems (IDS) are now becoming one of burning issue for any organization’s network. Intruders always search for vulnerabilities or flaws in target system and attack using different techniques. An intrusion detection system (IDS) is needed to detect and respond effectively whenever the confidentiality, integrity, and availability of computer resources are under attack. Today, number of open sources and commercial Intrusion Detection Systems are available to match organization’s requirements but the performance of these Intrusion Detection Systems is still the main concern. In this paper, we have analyzed the performance and applicability of the well knows IDS system based on mobile agent with their pros and cons. Mobile agent is efficient way to find out the intruder in distributed system. The main features of mobile agents are intelligence and mobility which is the core motivation to us to designed cost. The aim of this review work is to help to select appropriate IDS systems as per their requirement and application.

[1]  Rajendra Kumar Tiwari,et al.  Mobile Agent Based Distributed Intrusion Detection System: A Survey , 2012 .

[2]  Vivek Tiwari,et al.  Performance evolution of java remote method invocation and mobile agent techniques in context of Distributed Environment , 2010, 2010 International Conference on Networking and Information Technology.

[3]  Irfan-Ullah Awan,et al.  Performance Evaluation Study of Intrusion Detection Systems , 2011, ANT/MobiWIS.

[4]  Ahmed N. Abdalla,et al.  Intrusion Preventing System using Intrusion Detection System Decision Tree Data Mining , 2009 .

[5]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[6]  Wang Jianping,et al.  A Novel Network Attack Audit System based on Multi-Agent Technology , 2012 .

[7]  Ali A. Ghorbani,et al.  IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS 1 Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods , 2022 .

[8]  M. Tech,et al.  Distributed Intrusion Detection using Aglet Mobile Agent Technology , 2007 .

[9]  Harley Kozushko,et al.  Intrusion Detection : Host-Based and Network-Based Intrusion Detection Systems , 2003 .

[10]  Hu Mingzeng,et al.  A novel distributed intrusion detection model based on mobile agent , 2004, InfoSecu '04.

[11]  Vivek Tiwari,et al.  Cloud Computing: A Next Generation Revolution in IT with e-Governance , 2012 .

[12]  Manoj Kumar Shukla,et al.  Research on Mobile agent based network intrusion , 2011 .

[13]  Henda Hajjami Ben Ghézala,et al.  Misconfigurations discovery between distributed security components using the mobile agent approach , 2009, iiWAS.

[14]  Hassen Sallay,et al.  An Efficient Formal Framework for Intrusion Detection Systems , 2012, ANT/MobiWIS.