Mobile agent-based misuse intrusion detection rule propagation model for distributed system

被引:0
|
作者
Kim, TK [1 ]
Lee, DY [1 ]
Chung, TM [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Real Time Syst Lab, Jangan Gu, Suwon, Kyunggi Do, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper describes the rule propagation model for the Misuse detection methods using mobile agents. Approaches to detecting intrusions can be broadly classified into two categories: Anomaly Detection and Misuse Detection. Misuse detection is best suited for reliably detecting known use patterns. Misuse detection systems can detect many or all known attack patterns, but they are of little use for as yet unknown attack methods [1]. Therefore, the introduction of mobile agents to provide computational security by constantly moving around the Internet and propagating rules is presented as a solution to misuse detection. This work presents a method of use of mobile agent mechanisms to add mobility features to the process of rule propagation. This approach presents significant advantages in terms of spreading rules rapidly, increasing scalability and providing fault tolerance.
引用
收藏
页码:842 / 849
页数:8
相关论文
共 50 条
  • [1] Agent-based distributed cooperative intrusion detection system
    Lin Zhao-wen
    Ren Xing-tian
    Xa Yan
    [J]. 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 331 - +
  • [2] Research of Distributed Intrusion Detection System Model Based on Mobile Agent
    Liu Jianxiao
    Li Lijuan
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 53 - 57
  • [3] Mobile agent-based intrusion detection
    Qiao, YQ
    Ren, XH
    Wang, XL
    [J]. ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 4, 2005, : 57 - 60
  • [4] Agent-based approach for distributed intrusion detection system design
    Juszczyszyn, Krzysztof
    Nguyen, Ngoc Thanh
    Kolaczek, Grzegorz
    Grzech, Adam
    Pieczynska, Agnicszka
    Katarzyniak, Radoslaw
    [J]. COMPUTATIONAL SCIENCE - ICCS 2006, PT 3, PROCEEDINGS, 2006, 3993 : 224 - 231
  • [5] Research on Distributed Intrusion Detection System Based on Mobile Agent
    Hou, Zhisong.
    Yu, Zhou.
    Zheng, Wei.
    Zuo, Xiangang.
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (08) : 1919 - 1926
  • [6] A Mobile Agent and Snort Based Distributed Intrusion Detection System
    Ye, Xiao-Ling
    Zhang, Ying-Chao
    Zhang, Chao-Long
    Chen, Chao
    Huang, Xin-Yi
    [J]. 2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 281 - 285
  • [7] Research on distributed intrusion detection system based on mobile agent
    Cao, Jin-Gang
    Zheng, Gu-Ping
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1394 - 1399
  • [8] Mobile agent-based security model for distributed system
    Zhang, JY
    Li, YC
    Min, F
    Yang, GW
    [J]. PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 194 - 197
  • [9] Mobile agent-based security model for distributed system
    Qi, L
    Yu, L
    [J]. 2001 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: E-SYSTEMS AND E-MAN FOR CYBERNETICS IN CYBERSPACE, 2002, : 1754 - 1759
  • [10] Distributed model of intrusion detection system based on agent
    Ma, Heng-Tai
    Jiang, Jian-Chun
    Chen, Wei-Feng
    Qing, Si-Han
    [J]. Ruan Jian Xue Bao/Journal of Software, 2000, 11 (10): : 1312 - 1319