Intrusion Detection with Mobile Agents
نویسندگان
چکیده
During the last ten years, the Internet has grown considerably. More interconnected people yields increased information security problems. Indeed, the continuous increase in computer interconnectivity and interoperability in a fully open way enhances the intruder’s ability to attempt malicious behaviour against computers and networks and furthermore allows intruders to make these attempts extremely efficient. Detecting an intruder in a network environment is hard for a human and even if the amount of circulating information is collected by computers there is still too much information to analyse in real-time. Intrusion Detection Systems’ (IDSs) goal is to detect attacks against information systems. Notably it is difficult to guarantee a completely and provably secure information system and to be sure to always maintain it in a secure state during its utilization. This is why IDSs have to monitor the usage of such systems to detect eventual insecure states. For this task, new approaches and designs on IDSs are required which avoid, for example, centralised control and analysis of data to determine if an intruder entered the network. With this perspective and in the scope of a Swiss National Project (ADAMA II-2000-054014.98), we are investigating the use of Mobile Agents (MAs) research to address Intrusion Detection (ID) in an Intranet. After the general description of the different goals of the project, we expose our first stage ID model using MAs based on immune system principles.
منابع مشابه
A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملAn Adaptive Intrusion Detection and Defense System Based on Mobile Agents
This paper presents a distributed intrusion detection system (IDS) based on mobile agents that detect intrusion from outside the network segment as well as from inside. A main machine, being a typical intrusion detection system residing at a secure location, creates agents and dispatches them into the network. On each hop, the agents sniff the network traffic and look for abnormal activities by...
متن کاملDistributed Intrusion Detection using Mobile Agents
DIDMA (Distributed Intrusion Detection using Mobile Agents) is a novel architecture in the field of IDS (Intrusion Detection Systems), utilizing an agent-based approach in order to realize a distributed framework. The novelty in this architecture is the employment of mobile agents as its auditing components. This novel approach overcomes certain problems associated with traditional designs in I...
متن کاملDistributed Intrusion Detection System using Mobile Agents
The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS). Autonomous software agents, especially when equipped with mobility, promise an interesting design approach for such applications. We evaluate the implications of applying mobile agent technology to t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001