Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection

نویسنده

  • Marek Zielinski
چکیده

Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed to higher nodes in the hierarchy until the root node is reached. The root node is a command and control system that evaluates attack signatures and issues responses. Many single points of failure exist in an intrusion detection system (IDS) based on a hierarchical architecture that does not have redundant communication lines and the capability to dynamically reconfigure relationships in the case of failure of key components. For example, an attacker can cut off a control branch of the IDS by attacking an internal node or even interrupt the operation of the entire system by taking out the root command and control node. To solve this problem, we propose an IDS inspired by the human immune system. The architecture of the proposed IDS has no aggregation nodes or a root node that evaluates attack signatures. Instead, the function of attack signature evaluation is divided and placed within mobile agents. The mobile agents act similarly to white blood cells of the immune system and travel from host to host in the network to detect any intrusions. As in the immune system, intrusions are detected by distinguishing between "self" and "non-self", or normal and abnormal process behaviour respectively. The IDS can remain operational even when most of its components have been disabled because the agents that remain in the network can still carry out their task as they do not need to communicate with their home platform. Furthermore, because mobile agents are not static and their number can vary, the whole IDS is more difficult to disable than an IDS based only on static components.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Applying Intrusion Detection Systems To Wireless Sensor Networks

Wireless Sensor Networks (WSNs) have been employed in many real-world applications that greatly improve our life. by applying a genetic operator. However, the Intrusion detection systems in wireless sensor networks: A review. Intrusion Detection System (IDS) provides a solution to this problem by analysing the network in order to detect abnormal behaviour of the sensor node(s). A well designed ...

متن کامل

STLR: a novel danger theory based structural TLR algorithm

Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...

متن کامل

Applying Mobile Agent Technology to Intrusion Detection

The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS). Autonomous software agents, especially when equipped with mobility, promise an interesting design approach for such applications. We evaluate the implications of applying mobile agent technology to t...

متن کامل

A Strategic Review of Existing Mobile Agent- Based Intrusion Detection Systems

Intrusion Detection Systems (IDS) is defined as a component that analyses system and user operations in computer and network systems in search of activities considered undesirable from security perspectives. Applying mobile agent (MA) to intrusion detection design is a recent development and it is aimed at effective intrusion detection in distributed environment. From the literature, it is clea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004