Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques

被引:8
|
作者
El-Semary, Aly M. [1 ]
Mostafa, Mostafa Gadal-Haqq M. [2 ]
机构
[1] Al Azhar Univ, Fac Engn, Dept Syst & Comp Engn, Cairo, Egypt
[2] Ain Shams Univ, Fac Comp & Informat Sci, Dept Comp Sci, Cairo, Egypt
来源
关键词
Data-Mining; Fuzzy Logic; IDS; Intelligent Techniques; Network Security; Software Agents;
D O I
10.3745/JIPS.2010.6.4.481
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet explosion and the increase in crucial web applications such as e-banking and e-commerce, make essential the need for network security tools. One of such tools is an Intrusion detection system which can be classified based on detection approachs as being signature-based or anomaly-based. Even though intrusion detection systems are well defined, their cooperation with each other to detect attacks needs to be addressed. Consequently, a new architecture that allows them to cooperate in detecting attacks is proposed. The architecture uses Software Agents to provide scalability and distributability. It works in two modes: learning and detection. During learning mode, it generates a profile for each individual system using a fuzzy data mining algorithm. During detection mode, each system uses the FuzzyJess to match network traffic against its profile. The architecture was tested against a standard data set produced by MIT's Lincoln Laboratory and the primary results show its efficiency and capability to detect attacks. Finally, two new methods, the memory-window and memoryless-window, were developed for extracting useful parameters from raw packets. The parameters are used as detection metrics.
引用
收藏
页码:481 / 500
页数:20
相关论文
共 50 条
  • [31] Intelligent agents in intrusion detection of CSCW systems
    Yang, Zhimin
    Cao, Hai
    Tang, Wei
    2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, : 1001 - 1004
  • [32] Towards the automatic generation of mobile agents for distributed intrusion detection system
    Wang, YX
    Behera, SR
    Wong, J
    Helmer, G
    Honavar, V
    Miller, L
    Lutz, R
    Slagell, M
    JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (01) : 1 - 14
  • [33] Anomaly-based Intrusion Detection using Distributed intelligent systems
    Morel, Benoit
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 37 - 44
  • [34] Autonomous Agents based Dynamic Distributed (A2D2) intrusion detection system
    Cai, Yu
    Jasani, Hetal
    INNOVATIVE ALGORITHMS AND TECHNIQUES IN AUTOMATION, INDUSTRIAL ELECTRONICS AND TELECOMMUNICATIONS, 2007, : 527 - 533
  • [35] New distributed methodology for intrusion detection based on multi-agents system at two levels
    Raoui, D.
    Benhadou, S.
    Medromi, H.
    International Review on Computers and Software, 2010, 5 (03) : 298 - 302
  • [36] A novel scalable intrusion detection system based on deep learning
    Soosan Naderi Mighan
    Mohsen Kahani
    International Journal of Information Security, 2021, 20 : 387 - 403
  • [37] A novel scalable intrusion detection system based on deep learning
    Mighan, Soosan Naderi
    Kahani, Mohsen
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (03) : 387 - 403
  • [38] Distributed model of intrusion detection system based on agent
    Ma, Heng-Tai
    Jiang, Jian-Chun
    Chen, Wei-Feng
    Qing, Si-Han
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (10): : 1312 - 1319
  • [39] Distributed intrusion detection system based on Windows registry
    Zhang, Xue-Qin
    Lin, Jia-Jun
    Huadong Ligong Daxue Xuebao /Journal of East China University of Science and Technology, 2004, 30 (06): : 677 - 681
  • [40] Distributed intrusion detection system based on fuzzy rules
    Qiao, Peili
    Su, Jie
    Liu, Yahui
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2006, 2006, 6241