DIDMA: A distributed intrusion detection system using mobile agents

被引:30
|
作者
Kannadiga, P [1 ]
Zulkernine, M [1 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON K7L 3N6, Canada
关键词
D O I
10.1109/SNPD-SAWN.2005.31
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The widespread proliferation of Internet connections has made current computer networks more vulnerable to intrusions than before. In network intrusions' there may be multiple computing nodes that are attacked by intruders. The evidences of intrusions have to be gathered from all such attacked nodes. An intruder may move between multiple nodes in the network to conceal the origin of attack., or misuse some compromised hosts to launch the attack on other nodes. To detect such intrusion activities spread over the whole network, we present a new intrusion detection system (IDS) called Distributed Intrusion Detection using Mobile Agents (DIDAM). DIDAM uses a set of software entities called mobile agents that can move from one node to another node within a network, and perform the task of aggregation and correlation of the intrusion related data that it receives from another set of software entities called the static agents. Mobile agents reduce network bandwidth usage by moving data analysis computation to the location of the intrusion data, support heterogeneous plat-forms, and offer a lot of flexibility in creating a distributed IDS. DIDAM utilizes the above-mentioned beneficial features offered by mobile agent technology and addresses some of the issues with centralized IDS models. The detailed architecture and implementation of a prototype of DIDMA are described It has been tested using some well-known attacks and performances have been com-pared with centralized IDS models.
引用
收藏
页码:238 / 245
页数:8
相关论文
共 50 条
  • [21] A safe mobile agent system for distributed intrusion detection
    Zhong, SC
    Song, QF
    Cheng, XC
    Zhang, Y
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 2009 - 2014
  • [22] Implementation of an intrusion detection system based on mobile agents
    Bernardes, MC
    Moreira, ED
    INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 2000, : 158 - 164
  • [23] Information gathering with mobile agents for an intrusion detection system
    Asaka, Midori
    Systems and Computers in Japan, 1999, 30 (02) : 31 - 37
  • [24] A Distributed Self-Adaptive Intrusion Detection System for Mobile Ad-hoc Networks using Tamper Evident Mobile Agents
    Krishnan, Deepa
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 1203 - 1208
  • [25] Network security: distributed intrusion detection system using mobile agent technology
    Boukhlouf, Djemaa
    Kazar, Okba
    Kahloul, Laid
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2016, 17 (04) : 335 - 347
  • [26] Intrusion detection with mobile agents
    Jansen, WA
    COMPUTER COMMUNICATIONS, 2002, 25 (15) : 1392 - 1401
  • [27] Using correlation engine and mobile agents for intrusion detection
    Lips, Reginald
    El-Kadhi, Nabil
    PROCEEDINGS OF THE 12TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS , PTS 1-3: NEW ASPECTS OF COMPUTERS, 2008, : 662 - +
  • [28] Design of a distributed intrusion detection system based on independent agents
    Du, Y
    Wang, HQ
    Pang, YG
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTELLIGENT SENSING AND INFORMATION PROCESSING, 2004, : 254 - 257
  • [29] Research on Distributed Intrusion Detection System Based on Mobile Agent
    Hou, Zhisong.
    Yu, Zhou.
    Zheng, Wei.
    Zuo, Xiangang.
    JOURNAL OF COMPUTERS, 2012, 7 (08) : 1919 - 1926
  • [30] A Mobile Agent and Snort Based Distributed Intrusion Detection System
    Ye, Xiao-Ling
    Zhang, Ying-Chao
    Zhang, Chao-Long
    Chen, Chao
    Huang, Xin-Yi
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 281 - 285