scholarly journals A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems

10.28945/3372 ◽  
2009 ◽  
Author(s):  
Adebukola Onashoga ◽  
Adebayo Akinde ◽  
Adesina Sodiya

Intrusion Detection Systems (IDS) is defined as a component that analyses system and user operations in computer and network systems in search of activities considered undesirable from security perspectives. Applying mobile agent (MA) to intrusion detection design is a recent development and it is aimed at effective intrusion detection in distributed environment. From the literature, it is clear that most MA-based IDS that are available are not quite effective because their time to detection is high and detect limited intrusions.This paper proposes a way of classifying a typical IDS and then strategically reviews the existing mobile agent-based IDSs focusing on each of the categories of the classification, for example architecture, mode of data collection, the techniques for analysis, and the security of these intelligent codes. Their strengths and problems are stated wherever applicable. Furthermore, suggested ways of improving on current MA-IDS designs are presented in order to achieve an efficient mobile agent-based IDS for future security of distributed network.

Author(s):  
Theodor Richardson

Network Intrusion Detection Systems (NIDS) are designed to differentiate malicious traffic, from normal traf- fic, on a network system to detect the presence of an attack. Traditionally, the approach around which these systems are designed is based upon an assumption made by Dorothy Denning in 1987, stating that malicious traffic should be statistically differentiable from normal traffic. However, this statement was made regarding host systems and was not meant to be extended without adjustment to network systems. It is therefore necessary to change the granularity of this approach to find statistical anomalies per host as well as on the network as a whole. This approach lends itself well to the use of emergent monitoring agents per host, that have a central aggregation point with a visualization of the network as a whole. This chapter will discuss the structure, training, and deployment of such an agent-based intrusion detection system and analyze its viability in comparison to the more traditional anomaly-based approach to intrusion detection.


Author(s):  
Falkner Moraes ◽  
Zair Abdelouahab ◽  
Denivaldo Lopes ◽  
Emerson Oliveira ◽  
Cenidalva Teixeira ◽  
...  

2016 ◽  
Vol 2 (9) ◽  
Author(s):  
Shweta Sharma ◽  
Prof. Aishwarya Mishra

Security of network systems is becoming an important issue, as more and sensitive information is being stored and manipulated online. Therefore, it is essential to find an effective way to protect it. Mining approach can play very important role in developing an intrusion detection system. This paper presents various data mining Classification techniques applied on intrusion detection systems for the effective identification of both known and unknown patterns of attacks, to develop secure information systems.


Sign in / Sign up

Export Citation Format

Share Document