International Conference on Internet Surveillance and Protection (ICISP’06)
DOI: 10.1109/icisp.2006.6
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative Itinerant Agents (CIA): Security Scheme for Intrusion Detection Systems

Abstract: Intrusion Detection Systems (IDSs) detect suspicious activities and possible intrusions in a system or a particular network at the moment at which these happen. To achieve their objectives the different entities that compose the IDS need to communicate with each other. Thus, it is important to keep in mind the integrity of the information, authentication and access control. Agents provide flexibility and distributed processing of the network traffic but increase the risk of possible intrusions. In this paper w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Each transceiver is in charge of keeping a copy of the marks embedded in the agents in order to be able to compare them and know whether any mark has changed. Security scheme CIA [1] consists of providing vigilance over each monitor and transceiver of the IDS using Cooperative Itinerant Agents (CIAs). Each monitor in the IDS generates a CIA and is in charge of control it.…”
Section: Agents Watermarking and Fingerprintingmentioning
confidence: 99%
See 1 more Smart Citation
“…Each transceiver is in charge of keeping a copy of the marks embedded in the agents in order to be able to compare them and know whether any mark has changed. Security scheme CIA [1] consists of providing vigilance over each monitor and transceiver of the IDS using Cooperative Itinerant Agents (CIAs). Each monitor in the IDS generates a CIA and is in charge of control it.…”
Section: Agents Watermarking and Fingerprintingmentioning
confidence: 99%
“…We have proposed a security scheme named Cooperative Itinerant Agent (CIA) [1] in order to monitor all the IDS entities and improve the security of the system. We have included watermarking and fingerprinting techniques to identify each entity inside the system.…”
Section: Introductionmentioning
confidence: 99%
“…Here every layer activates the agents to the layer of agents that above to them. In [5] watermarking and finger printing is used to check infringement in the activities of the attacker. A distributed cooperative intrusion detection with the help of mobile agents is described in [6] by Dalila Boughaci et al [7] describes the intrusion detection by using the tables for malicious activities and accordingly it acknowledges among the nodes into the network.…”
Section: Related Workmentioning
confidence: 99%