2009
DOI: 10.4304/jsw.4.6.495-507
|View full text |Cite
|
Sign up to set email alerts
|

Agent IDS based on Misuse Approach

Abstract:

Most current IDS are generally centralized andsuffer from significant limitations when used in high speednetworks, especially when they face distributed attacks. Thispaper shows that the use of mobile agents has practical advantagesfor intrusion detection. For this purpose we carriedout a comparative experimental study… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 19 publications
(20 reference statements)
0
6
0
Order By: Relevance
“…Ktata et al [14] studied the detection rate of Nmap probes for four different NIDS (Snort, Prelude, Tamandua, and Firestorm). The authors found that Snort, Tamandua, and Firestorm detected about 70% of the tested Nmap probes, while Prelude detected a bit less than 60% of them.…”
Section: Related Workmentioning
confidence: 99%
“…Ktata et al [14] studied the detection rate of Nmap probes for four different NIDS (Snort, Prelude, Tamandua, and Firestorm). The authors found that Snort, Tamandua, and Firestorm detected about 70% of the tested Nmap probes, while Prelude detected a bit less than 60% of them.…”
Section: Related Workmentioning
confidence: 99%
“…With the new capability of mobility for intrusion detection, several advantages related to mobile agent usage are listed in literature (Jansen et al, 1999;Ktata et al, 2009). Some of them are listed as follows:…”
Section: Advantages Of Using Mobile Agents In Intrusion Detectionmentioning
confidence: 99%
“…Whenever, an intruder tries to disable the single point in a network, i.e the central analyzer. If the latter is disabled, the entire network becomes without protection (Ktata et al, 2009). In this case, a mobile agent-based IDS allows to palliate the drawback of central point of failure, since there is no central station.…”
Section: Introductionmentioning
confidence: 99%
“…According to these characteristics, the agent-based technology seemed to be an appropriate alternative for developing IDS. Recently, several new agent-based IDS were developed [13,16], using mobile agents [5,6,9,18], using a hierarchy of static agents [8,19] or employing a combination of both static and mobile agents [7].…”
Section: Related Workmentioning
confidence: 99%
“…The advantages of mobile agent technology includes: reducing network overload, overcoming network latency, synchronous and autonomous execution, robustness and fault-tolerance, system scalability, and operating in heterogeneous environments [9]. To this end, mobile agent technology has been shown to be very suitable to solve intrusion detection in a distributed environment [6].…”
Section: Introductionmentioning
confidence: 99%