Enhanced Intrusion Detection System with Mobile Agent

Abstract

This electronic The widespread proliferation of Internet connections has made current computer networks more vulnerable to intrusions than before. In network intrusions, there may be multiple computing nodes that are attacked by intruders. The evidences of intrusions have to be gathered from all such attacked nodes. An intruder may move between multiple nodes in the network to conceal the origin of attack, or misuse some compromised hosts to launch the attack on other nodes. To detect such intrusion activities spread over the whole network, we present a new intrusion detection system (IDS) called Distributed Intrusion Detection using Mobile Agents (DIDMA). DIDMA uses a set of software entities called mobile agents that can move from one node to another node within a network, and perform the task of aggregation and correlation of the intrusion related data that it receives from another set of software entities called the static agents. Mobile agents reduce network bandwidth usage by moving data analysis computation to the location of the intrusion data, support heterogeneous plat-forms, and offer a lot of flexibility in creating a distributed IDS. DIDMA utilizes the above-mentioned beneficial features offered by mobile agent technology and addresses some of the issues with centralized IDS models. The detailed architecture and implementation of a prototype of DIDMA are described. It has been tested using some well-known attacks and performances have been com-pared with centralized IDS models.

Authors and Affiliations

Trushna Tushare Khos Patil, C. O. Banchhor

Keywords

Related Articles

Automated Leukemia Detection using Contour Signature in Blood Microscopic Images

Out of four major types of leukemia acute lymphoblastic leukemia (ALL) is most common blood disorder in children’s of age ranging from 1-9 years. With lymphoblastic leukemia cancerous change begins in marrow cell whe...

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens

Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth...

Effective R-cube Algorithm for Deriving Relevant Information on the Web

The analysis of user search goals can be very useful in improving search engine relevance and user experience. A novel approach to infer user search goals by examines search engine query logs. A framework to determin...

A New Hybrid Automated Tarrif System For Grid Conneted Solar Powe Plants

Recently consumption or release of more energy in various forms in both households and industrial, malls, etc are became a big challenge to the researchers. In this work we developed a method to manage such energy in...

Secret Sharing of Convergent Keys to Third Party Concept of Dekey

Data de-duplication is a method for eliminating redundant data copies and has been widely used in cloud storage provider to reduce the storage space and bandwidth. The arising challenge is to perform secure de-duplic...

Download PDF file
  • EP ID EP27457
  • DOI -
  • Views 319
  • Downloads 7

How To Cite

Trushna Tushare Khos Patil, C. O. Banchhor (2012). Enhanced Intrusion Detection System with Mobile Agent. International Journal of Research in Computer and Communication Technology, 1(4), -. https://europub.co.uk./articles/-A-27457