Information-gathering with mobile agents for intrusion detection system

被引:0
|
作者
Asaka, M [1 ]
Goto, S [1 ]
机构
[1] IPA, Bunkyo Ku, Tokyo 1136591, Japan
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Many network intrusion detection systems detect intrusions by concentrating all logs of target systems in a server and having the server subsequently analyze these logs. At the Information-technology Promotion Agency (IPA), we have been developing an alternate type of network intrusion detection system called IDA (Intrusion Detection Agent system), which detects intrusions with mobile agents that act by gathering information related to intrusions from target systems on a network. The mobile agents autonomously trace the origin of the bleak-in without the intrusion-detection server's control, and also gather information from target systems. Consequently, network traffic between the target systems and the server is reduced. This paper describes how the mobile agents migrate from machine to machine within a network, and details how they trace intrusions and gather and exchange information efficiently.
引用
收藏
页码:23 / 31
页数:9
相关论文
共 50 条
  • [1] Detection of Concealment in an Information-Gathering Interview
    Vrij, Aldert
    Mann, Samantha
    Jundi, Shyma
    Hillman, Jackie
    Hope, Lorraine
    [J]. APPLIED COGNITIVE PSYCHOLOGY, 2014, 28 (06) : 860 - 866
  • [2] INFORMATION-GATHERING BY CIA
    KINGSLEY, SG
    [J]. SCIENCE, 1962, 136 (3519) : 914 - &
  • [3] INFORMATION-GATHERING BY CIA - REPLY
    WALL, PD
    [J]. SCIENCE, 1962, 136 (3519) : 916 - &
  • [4] Information-gathering in latent bandits
    Galozy, Alexander
    Nowaczyk, Slawomir
    [J]. KNOWLEDGE-BASED SYSTEMS, 2023, 260
  • [5] Distributed Intrusion Detection System using Mobile Agents
    Trivedi, Bhushan
    Rajput, Jayant
    Dwivedi, Chintan
    Jobanputra, Pinky
    [J]. COMPUTING, COMMUNICATION, AND CONTROL, 2011, 1 : 57 - 61
  • [6] Implementation of an intrusion detection system based on mobile agents
    Bernardes, MC
    Moreira, ED
    [J]. INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 2000, : 158 - 164
  • [7] A Distributed Intrusion Detection System Based on Mobile Agents
    Mo Xiu-liang
    Wang Chun-dong
    Wang Huai-bin
    [J]. PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 2110 - 2114
  • [8] Efficiently executing information-gathering plans
    Friedman, M
    Weld, DS
    [J]. IJCAI-97 - PROCEEDINGS OF THE FIFTEENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOLS 1 AND 2, 1997, : 785 - 791
  • [9] Intrusion detection with mobile agents
    Jansen, WA
    [J]. COMPUTER COMMUNICATIONS, 2002, 25 (15) : 1392 - 1401
  • [10] The information-gathering process for the wired engineer
    Romich, P
    [J]. ELECTRONIC DESIGN, 1997, 45 (01) : 61 - &