Multi-Agent Heterogeneous Intrusion Detection System

نویسندگان

  • Mikulás Pataky
  • Damas P. Gruska
چکیده

Multi-agent heterogeneous intrusion detection system (MAHIDS) is a prototype proposed to detect untrusted and unusual network behaviour. The main contribution of the system is the integration of several anomaly detection techniques and machinery of multi-agent temporal logic with hybrid argumentation. Every detection technique is represented by featuring a specific detection autonomous agent. In this stage, every agent determines the flow trustfulness from aggregated connection. The anomalies are used as an input for machinery of multiagent temporal logic which is represented by the logical agent. The logical agent is one of the system’s advantages because it has huge capabilities for making a right decision about intrusions from detected anomalies. Another significant advantage of M-AHIDS is a new innovative agent – Web agent. The Web agent is capable to detect trusted host from his activity on web pages. The system M-AHIDS is based on traffic statistics in sFlow format acquired by network device with sFlow agent and is able to perform a real-time surveillance of the 10 Gb networks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Asynchronous Alert Correlation in Multi-agent Intrusion Detection Systems

This paper presents conceptual model, architecture and software prototype of a multi-agent intrusion detection system (IDS) operating on the basis of heterogeneous alert correlation. The latter term denotes IDS provided with a structure of anomaly detection–like classifiers designed for detection of intrusions in cooperative mode. An idea is to use a structure of classifiers operating on the ba...

متن کامل

Analysing of M-AHIDS with Future States on DARPA and KDD99 Benchmarks

Second generation of Multi-agent heterogeneous intrusion detection system (M-AHIDS) is a prototype proposed to detect untrusted and unusual network behaviour. The M-AHIDS is based on online traffic statistics in sFlow format acquired by network device with the sFlow agent and is able to perform a real-time surveillance of the 10 Gb networks. However, after an immense reimplementation it is capa...

متن کامل

A Two-level Autonomous Intrusion Detection Model Inspired by the Immune System

There are several methods applied to distributed system security, which have the same absolute view of the intrusion. In their view, an operation could be legitimate or intrusive, which does not have any consistency with the complicated and heterogeneous nature of distributed systems. In this paper, a two level multi-agent model is proposed whose first level determines system’s unsafe behaviors...

متن کامل

Towards a new approach for intrusion detection with intelligent agents

In this paper, we focus on one critical issue in security management that is intrusion detection. Intrusion detection requirements and concepts are reviewed. Some existing systems are described. Their advantages and limitations are illustrated. Drawbacks of existing intrusion detection systems involve the necessity of designing a new generation of self-adaptive systems. In fact, mainly, self-co...

متن کامل

Multi-agent Peer-to-Peer Intrusion Detection

Ever increasing use of heterogeneous networks including mobile devices and ad-hoc sensor networks signifies the role of such information system properties as openness, autonomy, cooperation, coordination, etc. Agent-based service-oriented Peer-to-Peer (P2P) architecture provides attractive (if not single) design and implementation paradigm for such systems. This trend implies coherent evolution...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014