2010
DOI: 10.5121/ijnsa.2010.2411
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents

Abstract: Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial that efficient scalable techniques should be developed for IDS systems. Signature based detection is the most extensively used threat detection technique for Intrusion Detection Systems (IDS). One of the foremost challenges for signaturebased IDS systems is how to keep up with large volume of incoming traffic when each packet needs to be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(29 citation statements)
references
References 8 publications
(3 reference statements)
0
29
0
Order By: Relevance
“…Ref. [5] proposed a dynamic multilayer signature based IDS by using mobile agents, where each packet is compared with the database that can slow down the detection process. The other problem in this approach is the introduction of new services and need of a network administrator who manually updates or adds the signature.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Ref. [5] proposed a dynamic multilayer signature based IDS by using mobile agents, where each packet is compared with the database that can slow down the detection process. The other problem in this approach is the introduction of new services and need of a network administrator who manually updates or adds the signature.…”
Section: Related Workmentioning
confidence: 99%
“…Intrusion detection is defined as the process of identifying unauthorized use, misuse, and abuse of the computer system [4].To act appropriately against the attacks, currently security solutions are relying on the intrusion detection system. To detect the pattern and signatures of these malicious worms attacks normally IDS parameters divided into signature based or misuse detection and anomaly based systems [5]. Signature base intrusion detection system defines the set of rules that are used to recognize the given pattern by intruder.…”
Section: Introductionmentioning
confidence: 99%
“…Additional internal intruders are divided into invaders Science Publications AJAS who masquerade as another user. Those with genuine access to complex data and the most hazardous type, the intruders those have the influence to turn off audit control for them (Uddin and Rehman, 2010). Different types of threats include.…”
Section: Penetrationmentioning
confidence: 99%
“…When an IDS cannot keep up with the traffic flood, all it can do is to drop packets, therefore, may miss potential attacks. Author proposes a new model called Dynamic Multi-Layer Signature based IDS using Mobile Agents, which can detect imminent threats with very high success rate by dynamically and automatically creating and using small and efficient multiple databases, and at the same time, provide mechanism to update these small signature databases at regular intervals using Mobile Agents [4].…”
Section: Dynamic Multi-layer Signature Based Intrusion Detection Systmentioning
confidence: 99%