DIDMA: A distributed intrusion detection system using mobile agents

被引:30
|
作者
Kannadiga, P [1 ]
Zulkernine, M [1 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON K7L 3N6, Canada
关键词
D O I
10.1109/SNPD-SAWN.2005.31
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The widespread proliferation of Internet connections has made current computer networks more vulnerable to intrusions than before. In network intrusions' there may be multiple computing nodes that are attacked by intruders. The evidences of intrusions have to be gathered from all such attacked nodes. An intruder may move between multiple nodes in the network to conceal the origin of attack., or misuse some compromised hosts to launch the attack on other nodes. To detect such intrusion activities spread over the whole network, we present a new intrusion detection system (IDS) called Distributed Intrusion Detection using Mobile Agents (DIDAM). DIDAM uses a set of software entities called mobile agents that can move from one node to another node within a network, and perform the task of aggregation and correlation of the intrusion related data that it receives from another set of software entities called the static agents. Mobile agents reduce network bandwidth usage by moving data analysis computation to the location of the intrusion data, support heterogeneous plat-forms, and offer a lot of flexibility in creating a distributed IDS. DIDAM utilizes the above-mentioned beneficial features offered by mobile agent technology and addresses some of the issues with centralized IDS models. The detailed architecture and implementation of a prototype of DIDMA are described It has been tested using some well-known attacks and performances have been com-pared with centralized IDS models.
引用
收藏
页码:238 / 245
页数:8
相关论文
共 50 条
  • [1] Distributed Intrusion Detection System using Mobile Agents
    Trivedi, Bhushan
    Rajput, Jayant
    Dwivedi, Chintan
    Jobanputra, Pinky
    [J]. COMPUTING, COMMUNICATION, AND CONTROL, 2011, 1 : 57 - 61
  • [2] Distributed intrusion detection using mobile agents
    Argyroudis, Patroklos
    Paraskakis, Iraklis
    [J]. Recent Advances in Computers, Computing and Communications, 2002, : 375 - 380
  • [3] A Distributed Intrusion Detection System Based on Mobile Agents
    Mo Xiu-liang
    Wang Chun-dong
    Wang Huai-bin
    [J]. PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 2110 - 2114
  • [4] Distributed Intrusion Detection in Clouds Using Mobile Agents
    Dastjerdi, Amir Vahid
    Abu Bakar, Kamalrulnizam
    Tabatabaei, Sayed Gholam Hassan
    [J]. 2009 THIRD INTERNATIONAL CONFERENCE ON ADVANCED ENGINEERING COMPUTING AND APPLICATIONS IN SCIENCES (ADVCOMP 2009), 2009, : 175 - +
  • [5] Preemptive distributed intrusion detection using mobile agents
    Chan, PC
    Wei, VK
    [J]. WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 103 - 108
  • [6] Distributed Intrusion Detection System using Mobile Agents in Cloud Computing Environment
    Mehmood, Yasir
    Kanwal, Ayesha
    Shibli, Muhammad Awais
    Masood, Rahat
    [J]. 2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 1 - 8
  • [7] TRUSTWORTHY DISTRIBUTED COLLABORATIVE INTRUSION DETECTION USING MOBILE AGENTS
    Asokan, Nandini
    Sujitha, A.
    Poornima, R.
    Sujatha, Kola P.
    Kannan, A.
    [J]. 2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 103 - 107
  • [8] Towards the automatic generation of mobile agents for distributed intrusion detection system
    Wang, YX
    Behera, SR
    Wong, J
    Helmer, G
    Honavar, V
    Miller, L
    Lutz, R
    Slagell, M
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (01) : 1 - 14
  • [9] Distributed Intrusion Detection using Mobile Agents against DDoS Attacks
    Akyazi, Ugur
    Uyar, A. Sima Etaner
    [J]. 23RD INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2008, : 346 - +
  • [10] An Architecture of a Distributed Intrusion Detection System Using Cooperating Agents
    Sen, Jaydip
    Sengupta, Indranil
    Chowdhury, Piyali Roy
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS (ICOCI 2006), 2006, : 17 - +