Proceedings of the 42nd Annual Southeast Regional Conference 2004
DOI: 10.1145/986537.986581
|View full text |Cite
|
Sign up to set email alerts
|

A P2P intrusion detection system based on mobile agents

Abstract: Traditional intrusion detection systems have a central coordinator with a static hierarchical architecture. We propose a peer-to-peer intrusion detection system that has no central coordinator. Our approach is like that of a "neighborhood watch". A virtual neighborhood is created where neighbors take on the task of looking out for each other. When an intrusion occurs they observe this intrusion and inform the residents about this intrusion and collectively take action. We use cooperating, mobile agents for int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2005
2005
2014
2014

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(17 citation statements)
references
References 4 publications
(5 reference statements)
0
17
0
Order By: Relevance
“…An agent migration strategy that can enable hosts of a network to make more efficient and accurate detections was introduced. Compared to [5], [7], and [9], MA-DIDF can gather information not only from neighbours of the compromised host but from more other hosts in the network that can lead to more accurate final decision. The future work of this research is to improve the performance of MADIDF, including optimizing the number of Retrieval Agents and avoiding duplicate detection, especially in large scale network and test it in real applications.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…An agent migration strategy that can enable hosts of a network to make more efficient and accurate detections was introduced. Compared to [5], [7], and [9], MA-DIDF can gather information not only from neighbours of the compromised host but from more other hosts in the network that can lead to more accurate final decision. The future work of this research is to improve the performance of MADIDF, including optimizing the number of Retrieval Agents and avoiding duplicate detection, especially in large scale network and test it in real applications.…”
Section: Discussionmentioning
confidence: 99%
“…However, the host in the network only dispatches a mobile agent to its neighbours when a suspicious incident is observed at that host instead of periodically sending mobile agent to its neighbours. Although this system overcomes some drawbacks of that proposed in [5], it still has a few limitations. Because the host in the network only asks its neighbours for collaborative decision, it might not detect some specific attacks, which simultaneously attack multiple hosts in a network, like doorknob and network browsing.…”
Section: Related Workmentioning
confidence: 95%
See 2 more Smart Citations
“…The authors have created an EQL (Event Query Language) with syntax similar to SQL (Sequence Query Language) used in databases. Other mobile agent based IDS's include a P2P based IDS (Ramachandran & Hart, 2004) that works in a neighborhood watch manner where each agent looks after other agents in its vicinity by using a voting procedure to take action against a compromised agent; the MA-IDS system (Li et al, 2004) which uses encrypted communication between the mobile agents in the system, and use a threshold mechanism to detect the probability for each intrusion depending on the quantity of each intrusion type obtained allowing it to learn in a one dimensional method. Some other mobile agent based IDS's include a position paper (Aslam et al, 2001) that claims to work on D'Agents environment; and work by (Foukia et al, 2001;Foukia et al, 2003) which uses a social insect metaphor and immune systems to model an intrusion detection system.…”
Section: Agent Based Security Systemsmentioning
confidence: 99%