2007 2nd International Conference on Communication Systems Software and Middleware 2007
DOI: 10.1109/comswa.2007.382483
|View full text |Cite
|
Sign up to set email alerts
|

APHIDS++: A Mobile Agent Based Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2012
2012

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Smartphone malware effects [2] There are two major technologies in the field of malware detection. One is the firewall which is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass [3]. It comprises four parts: service access policy, verification tools, packet filters and application gateway.…”
Section: Introductionmentioning
confidence: 99%
“…Smartphone malware effects [2] There are two major technologies in the field of malware detection. One is the firewall which is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass [3]. It comprises four parts: service access policy, verification tools, packet filters and application gateway.…”
Section: Introductionmentioning
confidence: 99%
“…Based on our previous experience on mobile agent based intrusion detection systems (Alam et al, 2005;Alam & Vuong, 2007), and an in-depth understanding of the behavior of botnets, we believe the appropriate approach to defend against botnets is to adapt a mobile-agent based paradigm in combination with current host monitoring techniques, to detect bot infected hosts based on bot behavior analysis. Our proposed approach predominantly would work for a local or remote environment with a single administrative entity with access to network level data of monitored hosts and optionally, access to the host machine via mobile-agent middleware if host-based bot behavior features are need.…”
Section: Agent-based Botnet Detectionmentioning
confidence: 99%