Seventh IEEE/ACIS International Conference on Computer and Information Science (Icis 2008) 2008
DOI: 10.1109/icis.2008.21
|View full text |Cite
|
Sign up to set email alerts
|

P2P Distributed Intrusion Detections by Using Mobile Agents

Abstract: Traditional hierarchical intrusion detection systems have a central manager which attracts hackers to attack and might overload when there are too many client requests. To overcome these drawbacks, some researchers suggested to apply Peer-to-Peer approaches in intrusion detection. Most current Peer-to-Peer intrusion detection systems only allow hosts to collect related information from "neighbours" (one hop hosts). The limitation of information sources may lead a system to make inaccurate decisions. In this pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 6 publications
0
15
0
Order By: Relevance
“…Dastjerdi et al [78] propose a new IDS system by combining and extending the peer-to-peer IDS based on mobile agents [79] and the distributed intrusion detection using mobile agent (DIDMA) [80]. It consists of four main components namely IDS control center (IDS CC), agency, application specific static agent detector and specialized investigative mobile agent.…”
Section: Intrusion Detection Systems (Ids)mentioning
confidence: 99%
“…Dastjerdi et al [78] propose a new IDS system by combining and extending the peer-to-peer IDS based on mobile agents [79] and the distributed intrusion detection using mobile agent (DIDMA) [80]. It consists of four main components namely IDS control center (IDS CC), agency, application specific static agent detector and specialized investigative mobile agent.…”
Section: Intrusion Detection Systems (Ids)mentioning
confidence: 99%
“…The second is that when a system with a single central server and numerous clients, the scalability is a problem, as the server has to maintain many connections to the clients. In order to overcome the two problems, several P2P intrusion detection architectures were presented, like [15]. In this paper, we will utilize ETAP to demonstrate the detection process against Doorknob-Rattling attack [12] in a P2P environment.…”
Section: An Example Of Etap Potential Applicationmentioning
confidence: 99%
“…Intrusion is a set of actions which attempt to comprise the confidentiality, denial of resources or unauthorized use of resources [1]. Intrusion Detection System (IDS) is used to detect various intrusions in network environment and to prevent information from malicious attackers [2]. Detection is not introduced to replace prevention-based techniques such as authentication and access control; instead, it is intended to complement existing security measures and detect actions that bypass the security monitoring and control component of the system [3].…”
Section: Introductionmentioning
confidence: 99%
“…This approach allows the detection of intrusions which the system has learned their signatures perfectly. Anomaly intrusion detection [7], [8], [9] are designed to detect general misuse and attacks for which no signature exists. This attempts to construct a model according to the statical knowledge about the normal activity of the computer system.…”
Section: Introductionmentioning
confidence: 99%