DIDMA: A distributed intrusion detection system using mobile agents

被引:30
|
作者
Kannadiga, P [1 ]
Zulkernine, M [1 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON K7L 3N6, Canada
关键词
D O I
10.1109/SNPD-SAWN.2005.31
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The widespread proliferation of Internet connections has made current computer networks more vulnerable to intrusions than before. In network intrusions' there may be multiple computing nodes that are attacked by intruders. The evidences of intrusions have to be gathered from all such attacked nodes. An intruder may move between multiple nodes in the network to conceal the origin of attack., or misuse some compromised hosts to launch the attack on other nodes. To detect such intrusion activities spread over the whole network, we present a new intrusion detection system (IDS) called Distributed Intrusion Detection using Mobile Agents (DIDAM). DIDAM uses a set of software entities called mobile agents that can move from one node to another node within a network, and perform the task of aggregation and correlation of the intrusion related data that it receives from another set of software entities called the static agents. Mobile agents reduce network bandwidth usage by moving data analysis computation to the location of the intrusion data, support heterogeneous plat-forms, and offer a lot of flexibility in creating a distributed IDS. DIDAM utilizes the above-mentioned beneficial features offered by mobile agent technology and addresses some of the issues with centralized IDS models. The detailed architecture and implementation of a prototype of DIDMA are described It has been tested using some well-known attacks and performances have been com-pared with centralized IDS models.
引用
收藏
页码:238 / 245
页数:8
相关论文
共 50 条
  • [41] Research of Distributed Intrusion Detection System Model Based on Mobile Agent
    Liu Jianxiao
    Li Lijuan
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 53 - 57
  • [42] Distributed Court System for intrusion detection in mobile ad hoc networks
    Zhang, Da
    Yeo, Chai Kiat
    COMPUTERS & SECURITY, 2011, 30 (08) : 555 - 570
  • [43] A SNORT-BASED MOBILE AGENT FOR A DISTRIBUTED INTRUSION DETECTION SYSTEM
    Brahmil, Imen
    Ben Yahial, Sadok
    Poncelet, Pascal
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 198 - 207
  • [44] Efficient Anomaly Intrusion Detection System in Adhoc Networks by Mobile Agents
    Esfandi, Abolfazl
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 7, 2010, : 73 - 77
  • [45] Mobile agents-based intrusion detection system for mobile ad hoc networks
    Li, Yinan
    Qian, Zhihong
    2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATION AND 2010 ASIA-PACIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND OCEAN ENGINEERING: CICC-ITOE 2010, PROCEEDINGS, 2010, : 145 - 148
  • [46] P2P distributed intrusion detections by using mobile agents
    Ye, Dayong
    Bai, Quan
    Zhang, Minjie
    Ye, Zhen
    7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 259 - +
  • [47] Using Attacks Ontology in Distributed Intrusion Detection System
    Abdoli, F.
    Kahani, M.
    ADVANCES IN COMPUTER AND INFORMATIOM SCIENCES AND ENGINEERING, 2008, : 153 - +
  • [48] Modeling of distributed intrusion detection using fuzzy system
    Seo, Heesuk
    Kim, Taekyung
    Kim, Hyungjong
    COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 165 - 170
  • [49] Using mobile agents for intrusion detection in wireless ad hoc networks
    Hijazi, A
    Nasser, N
    2005 INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2005, : 362 - 366
  • [50] Intrusion detection using mobile agents in wireless ad hoc networks
    Kachirski, O
    Guha, R
    IEEE WORKSHOP ON KNOWLEDGE MEDIA NETWORKING, PROCEEDINGS, 2002, : 153 - 158