Intrusion Detection Based on Swarm Intelligence using mobile agent

نویسندگان

  • Khaled Sellami
  • Rachid Chelouah
  • Lynda Sellami
  • Mohamed Ahmed-Nacer
چکیده

Due to the increase in access of malicious data over the internet resources, intrusions Detection Systems (IDSs) have become the necessary component of the computer and information security framework. Although the field of IDSs is still developing, they are not able to detect all types of intrusions. New intelligent Intrusion Detection Systems (IDSs) which are based on sophisticated algorithms rather than current signature-base detections are in demand. This work discuss about the ways of implementing a swarm intelligence approach to data clustering to detect intrusions. Mobile agent technology is used to initially collecting data properties. These data are evaluated by the combining of the artificial Immune recognition system and the artificial fuzzy ants clustering systems. Our approach allows us to recognize not only known attacks but also to detect suspicious activity that may be the result on knowledge Discovery and Data Mining (KDDCup 1999) dataset compared to a standard learning schema that use the full dataset.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fuzzy Based Detection and Swarm Based Authenticated Routing in Manet

In mobile ad hoc networks (MANET), Artificial Intelligence (AI) based distributed intrusion detection (DIDS) techniques are very rarely available. In general, these techniques are used for either detection or authentication process. In this paper, we propose a combined approach named as fuzzy based intrusion detection and swarm based authenticated routing in MANET. This technique involves the d...

متن کامل

Swarm based Intrusion Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks

In mobile ad hoc networks (MANETs), the malicious flooding attack is very hazardous since it not only clogs the victim node but also the entire network. Also it may cause packet drops or alteration of the routing message that will further result in network dysfunctioning. In this paper, we propose a swarm based detection and defense technique for malicious attacks in mobile ad hoc networks (MAN...

متن کامل

Intelligent feature selection and classification techniques for intrusion detection in networks: a survey

Rapid growth in the Internet usage and diverse military applications have led researchers to think of intelligent systems that can assist the users and applications in getting the services by delivering required quality of service in networks. Some kinds of intelligent techniques are appropriate for providing security in communication pertaining to distributed environments such as mobile comput...

متن کامل

Mobile Security Agents for Network Traffic Analysis

This paper describes the implementation of a distributed agent architecture for intrusion detection and response in networked computers. Unlike conventional intrusion detection systems (IDS), this security system attempts to emulate mechanisms of the natural immune system using Java-based mobile software agents. These security agents monitor multiple levels (packet, process, system, and user) o...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011