Intrusion Detection Based on Swarm Intelligence using mobile agent
نویسندگان
چکیده
Due to the increase in access of malicious data over the internet resources, intrusions Detection Systems (IDSs) have become the necessary component of the computer and information security framework. Although the field of IDSs is still developing, they are not able to detect all types of intrusions. New intelligent Intrusion Detection Systems (IDSs) which are based on sophisticated algorithms rather than current signature-base detections are in demand. This work discuss about the ways of implementing a swarm intelligence approach to data clustering to detect intrusions. Mobile agent technology is used to initially collecting data properties. These data are evaluated by the combining of the artificial Immune recognition system and the artificial fuzzy ants clustering systems. Our approach allows us to recognize not only known attacks but also to detect suspicious activity that may be the result on knowledge Discovery and Data Mining (KDDCup 1999) dataset compared to a standard learning schema that use the full dataset.
منابع مشابه
Fuzzy Based Detection and Swarm Based Authenticated Routing in Manet
In mobile ad hoc networks (MANET), Artificial Intelligence (AI) based distributed intrusion detection (DIDS) techniques are very rarely available. In general, these techniques are used for either detection or authentication process. In this paper, we propose a combined approach named as fuzzy based intrusion detection and swarm based authenticated routing in MANET. This technique involves the d...
متن کاملSwarm based Intrusion Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks
In mobile ad hoc networks (MANETs), the malicious flooding attack is very hazardous since it not only clogs the victim node but also the entire network. Also it may cause packet drops or alteration of the routing message that will further result in network dysfunctioning. In this paper, we propose a swarm based detection and defense technique for malicious attacks in mobile ad hoc networks (MAN...
متن کاملIntelligent feature selection and classification techniques for intrusion detection in networks: a survey
Rapid growth in the Internet usage and diverse military applications have led researchers to think of intelligent systems that can assist the users and applications in getting the services by delivering required quality of service in networks. Some kinds of intelligent techniques are appropriate for providing security in communication pertaining to distributed environments such as mobile comput...
متن کاملMobile Security Agents for Network Traffic Analysis
This paper describes the implementation of a distributed agent architecture for intrusion detection and response in networked computers. Unlike conventional intrusion detection systems (IDS), this security system attempts to emulate mechanisms of the natural immune system using Java-based mobile software agents. These security agents monitor multiple levels (packet, process, system, and user) o...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011