2016
DOI: 10.4236/jcc.2016.44008
|View full text |Cite
|
Sign up to set email alerts
|

General Study of Mobile Agent Based Intrusion Detection System (IDS)

Abstract: The extensive access of network interaction has made present networks more responsive to earlier intrusions. In distributed network intrusions, there are many computing nodes that are assisted by intruders. The evidence of intrusions is to be associated from all the held up nodes. From the last few years, mobile agent based technique in intrusion detection system (IDS) has been widely used to detect intrusion over distributed network. This paper presented survey of several existing mobile agent based intrusion… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…There are prototypes of scalable and decentralized agent-based IDS that use 3 types of algorithms (heavy, medium, and light scan algorithms) to detect malicious activities as early as possible [ 87 , 146 , 147 ]. Backpropagation neural network techniques can be used in IDS to reduce the response times and false alarm rates [ 148 , 149 ]. To improve detection latency and load balancing, a collaborative IDS uses publish and subscribe techniques to selectively route evidence of malicious activities between peers in the network using distributed lookup mechanisms [ 150 , 151 ].…”
Section: Discussionmentioning
confidence: 99%
“…There are prototypes of scalable and decentralized agent-based IDS that use 3 types of algorithms (heavy, medium, and light scan algorithms) to detect malicious activities as early as possible [ 87 , 146 , 147 ]. Backpropagation neural network techniques can be used in IDS to reduce the response times and false alarm rates [ 148 , 149 ]. To improve detection latency and load balancing, a collaborative IDS uses publish and subscribe techniques to selectively route evidence of malicious activities between peers in the network using distributed lookup mechanisms [ 150 , 151 ].…”
Section: Discussionmentioning
confidence: 99%
“…Following the idea of collaborative IDS, some works 83,84 used the MASs to achieve more efficiency in the case of network security. As a first example, Krishnan 47 presents an efficient distribution method for the MAs to improve the performance of IDSs.…”
Section: Simulated Approachesmentioning
confidence: 99%
“…Jain et al in their article make detailed comparative analysis of different mobile agent based IDS [28].…”
Section: F Intelligent Agentsmentioning
confidence: 99%