Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques

被引:8
|
作者
El-Semary, Aly M. [1 ]
Mostafa, Mostafa Gadal-Haqq M. [2 ]
机构
[1] Al Azhar Univ, Fac Engn, Dept Syst & Comp Engn, Cairo, Egypt
[2] Ain Shams Univ, Fac Comp & Informat Sci, Dept Comp Sci, Cairo, Egypt
来源
关键词
Data-Mining; Fuzzy Logic; IDS; Intelligent Techniques; Network Security; Software Agents;
D O I
10.3745/JIPS.2010.6.4.481
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet explosion and the increase in crucial web applications such as e-banking and e-commerce, make essential the need for network security tools. One of such tools is an Intrusion detection system which can be classified based on detection approachs as being signature-based or anomaly-based. Even though intrusion detection systems are well defined, their cooperation with each other to detect attacks needs to be addressed. Consequently, a new architecture that allows them to cooperate in detecting attacks is proposed. The architecture uses Software Agents to provide scalability and distributability. It works in two modes: learning and detection. During learning mode, it generates a profile for each individual system using a fuzzy data mining algorithm. During detection mode, each system uses the FuzzyJess to match network traffic against its profile. The architecture was tested against a standard data set produced by MIT's Lincoln Laboratory and the primary results show its efficiency and capability to detect attacks. Finally, two new methods, the memory-window and memoryless-window, were developed for extracting useful parameters from raw packets. The parameters are used as detection metrics.
引用
收藏
页码:481 / 500
页数:20
相关论文
共 50 条
  • [21] An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques
    Haque, Mohd Junedul
    Magld, Khalid W.
    Hundewale, Nisar
    2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 13 - 17
  • [22] A distributed intrusion detection framework based on autonomous and mobile agents
    Boughaci, Dalila
    Drias, Habiba
    Bendib, Ahmed
    Bouznit, Youcef
    Benhamou, Belaid
    DEPCOS-RELCOMEX 2006, 2006, : 248 - +
  • [23] A Distributed Intelligent Intrusion Detection System based on Parallel Machine Learning and Big Data Analysis
    Louati, Faten
    Ktata, Farah Barika
    Ben Amor, Ikram Amous
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON SENSOR NETWORKS (SENSORNETS), 2021, : 152 - 157
  • [24] An intelligent intrusion detection system
    Nevrus Kaja
    Adnan Shaout
    Di Ma
    Applied Intelligence, 2019, 49 : 3235 - 3247
  • [25] Intelligent intrusion detection system
    Lee, KC
    Mikhailov, L
    2004 2ND INTERNATIONAL IEEE CONFERENCE INTELLIGENT SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 497 - 502
  • [26] An intelligent intrusion detection system
    Kaja, Nevrus
    Shaout, Adnan
    Ma, Di
    APPLIED INTELLIGENCE, 2019, 49 (09) : 3235 - 3247
  • [27] Intelligent Network Intrusion Detection System using Data Mining Techniques
    Sultana, Amreen
    Jabbar, M. A.
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 329 - 333
  • [28] Construction of Intelligent Intrusion Detection System Based on KINECT
    Zhangwei
    Chakraborty, Goutam
    2013 INTERNATIONAL JOINT CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY & UBI-MEDIA COMPUTING (ICAST-UMEDIA), 2013, : 81 - 86
  • [29] An intrusion detection system based on intelligent cluster activities
    Qian, Z., 1600, CESER Publications, Post Box No. 113, Roorkee, 247667, India (45):
  • [30] A hybrid intelligent agent based intrusion detection system
    Jaisankar, N.
    Kannan, A.
    Journal of Computational Information Systems, 2011, 7 (08): : 2608 - 2615