Network security: distributed intrusion detection system using mobile agent technology

被引:6
作者
Boukhlouf, Djemaa [1 ]
Kazar, Okba [1 ]
Kahloul, Laid [1 ]
机构
[1] Univ Biskra, Dept Comp Sci, LINFI Lab, Biskra 07000, Algeria
关键词
network security; intrusion; mobile agents; intrusion detection system; hybrid approach; aglets;
D O I
10.1504/IJCNDS.2016.080583
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer networks connected to the internet are always exposed to many kinds of cybercrimes. An internet user with malicious intent can access, modify, or delete sensitive information present on other computers or make some of the computer services unavailable to other users. An intrusion detection system (IDS) is the process of monitoring the events occurring in a computer system or network and analysing them for sign of intrusions. Centralised IDSs suffer from significant limitations when they are used in high speed networks, especially when they face distributed attacks. In this paper, we propose a distributed intrusion detection system based on mobile agents for network security. The proposed approach uses the platform aglets for the creation and the distribution of four types of mobile agents. A prototypical implementation is tested with different simulated attacks in an isolated network. The obtained results demonstrate the effectiveness of the proposed system.
引用
收藏
页码:335 / 347
页数:13
相关论文
共 22 条
[1]   A new adaptive intrusion detection system based on the intersection of two different classifiers [J].
Ahmim, A. ;
Ghoualmi-Zine, N. .
International Journal of Security and Networks, 2014, 9 (03) :125-132
[2]  
Balasubramaniyan J. S., 1996, 9805 CERIAS
[3]  
Barika F. A., 2009, Journal of Software, V4, P495
[4]  
Boughaci D., 2007, P 2007 EUR C TEL INF, P12
[5]  
Brahmi I, 2010, LECT NOTES COMPUT SC, V6122, P73, DOI 10.1007/978-3-642-13601-6_9
[6]  
Crosbie M., 1995, CSDTR95008 PURD U
[7]   CIDS: An agent-based intrusion detection system [J].
Dasgupta, D ;
Gonzalez, F ;
Yallapu, K ;
Gomez, J ;
Yarramsettii, R .
COMPUTERS & SECURITY, 2005, 24 (05) :387-398
[8]  
Dastjerdi A. V., 2008, P WORLD ACAD SCI ENG, V35
[9]  
Deepa A. J., 2015, International Journal of Enterprise Network Management, V6, P275
[10]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232