A SNORT-BASED MOBILE AGENT FOR A DISTRIBUTED INTRUSION DETECTION SYSTEM

被引:0
|
作者
Brahmil, Imen [1 ]
Ben Yahial, Sadok [1 ]
Poncelet, Pascal [2 ]
机构
[1] Fac Sci Tunis, Tunis, Tunisia
[2] LIRMM, Montpellier, France
关键词
Misuse detection; Intrusion detection system; Mobiles agents; SNORT rules;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapid growth of the network application, new kinds of network attacks are endlessly emerging. Thus, it is of paramount importance to protect the networks from attackers. Consequently, the Intrusion Detection Systems (IDS) are quickly becoming a popular requirement in building a network security infrastructure. Most existing and commercial IDS are generally centralized and suffer from a number of drawbacks, e.g., high rates of false positives, low efficiency, etc, especially when they face distributed attacks. In this paper, we introduce a novel mobile agent-based intrusion detection system focusing on the misuse detection approach, called DIDMAS (Distributed Intrusion Detection using Mobile Agents and Snort). DIDMAS takes advantages of the mobile agent paradigm to implement an efficient distributed system, as well as the integration of existing techniques, i.e., the well-known IDS SNORT. Carried out experiments showed that our proposed system presents better performance as well as a good scalability compared to the pioneer known centralized IDS SNORT system over real traffic and a set of simulated attacks.
引用
收藏
页码:198 / 207
页数:10
相关论文
共 50 条
  • [21] A Novel Distributed Intrusion Detection Model Based on Immune Mobile Agent
    Li, Yongzhong
    Wang, Rushan
    Xu, Jing
    2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 72 - 75
  • [22] A New Distributed Intrusion Detection Method Based on Immune Mobile Agent
    Li, Yongzhong
    Jing, Chunwei
    Xu, Jing
    LIFE SYSTEM MODELING AND INTELLIGENT COMPUTING, PT I, 2010, 6328 : 233 - +
  • [23] A New Distributed Intrusion Detection Model Based on Immune Mobile Agent
    Xu, Jing
    Li, Yongzhong
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 461 - +
  • [24] Mobile agent-based misuse intrusion detection rule propagation model for distributed system
    Kim, TK
    Lee, DY
    Chung, TM
    EURASIA-ICT 2002: INFORMATION AND COMMUNICATION TECHNOLOGY, PROCEEDINGS, 2002, 2510 : 842 - 849
  • [25] A model of intelligent agent based distributed intrusion detection system
    Fu, W
    Meng, B
    PROCEEDINGS OF 2003 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING, VOLS I AND II, 2003, : 92 - 95
  • [26] VoIP Intrusion Detection System with Snort
    Ciz, Pavol
    Labaj, Ondrej
    Podhradsky, Pavol
    Londak, Juraj
    PROCEEDINGS ELMAR-2012, 2012, : 137 - 140
  • [27] Network security: distributed intrusion detection system using mobile agent technology
    Boukhlouf, Djemaa
    Kazar, Okba
    Kahloul, Laid
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2016, 17 (04) : 335 - 347
  • [28] Agent-based distributed cooperative intrusion detection system
    Lin Zhao-wen
    Ren Xing-tian
    Xa Yan
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 331 - +
  • [29] APHIDS++ - A mobile agent based intrusion detection system
    Alam, Mohammed S.
    Vuong, Son T.
    2007 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2007, : 896 - +
  • [30] The Research and Design of Intrusion Detection System Based on Mobile Agent
    Wang, Shu-min
    Zhou, Yi
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ENGINEERING (ACSE 2014), 2014, : 285 - 289