Enhanced Intrusion Detection System with Mobile Agent
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 4
Abstract
This electronic The widespread proliferation of Internet connections has made current computer networks more vulnerable to intrusions than before. In network intrusions, there may be multiple computing nodes that are attacked by intruders. The evidences of intrusions have to be gathered from all such attacked nodes. An intruder may move between multiple nodes in the network to conceal the origin of attack, or misuse some compromised hosts to launch the attack on other nodes. To detect such intrusion activities spread over the whole network, we present a new intrusion detection system (IDS) called Distributed Intrusion Detection using Mobile Agents (DIDMA). DIDMA uses a set of software entities called mobile agents that can move from one node to another node within a network, and perform the task of aggregation and correlation of the intrusion related data that it receives from another set of software entities called the static agents. Mobile agents reduce network bandwidth usage by moving data analysis computation to the location of the intrusion data, support heterogeneous plat-forms, and offer a lot of flexibility in creating a distributed IDS. DIDMA utilizes the above-mentioned beneficial features offered by mobile agent technology and addresses some of the issues with centralized IDS models. The detailed architecture and implementation of a prototype of DIDMA are described. It has been tested using some well-known attacks and performances have been com-pared with centralized IDS models.
Authors and Affiliations
Trushna Tushare Khos Patil, C. O. Banchhor
A Novel Approach to Determine the Rules for Web Page Prediction using Dynamically Chosen K-Order Markov Models
The problem of predicting user’s behavior on a Web site has fundamental significance due to the rapid growth of the World Wide Web. Recent research initiatives have addressed the need for improved performance of Web...
Design of Energy Efficient Logic Using Adiabatic Technique
With the adiabatic switching approach, the circuit energies are conserved rather than dissipated as heat. Depending on the application and the system requirements, this approach can be used to reduce the power dissip...
An Effective Approach Of Compressing Encrypted Images
In this paper proposing a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo- 256 addition with nonrandom numbers that are derived from a s...
Design And Implementation of CMOS Adder Cell With Reduced Leakage Power Technique In 90nm Technology
Now-a-days Power consumption (or) power dissipation has becomes the most important criteria for implementing anyone of the digital circuit. While calculating the efficient value of the output of that particular digit...
Effective Integration of Voltage Source Converters (VSCs) in weak grids
A New control topology is presented in this paper to have an effective integration of voltage source converters (VSCs) in weak grids. Even though the controller emulates the dynamic performance of synchronous machine...