Enhanced Intrusion Detection System with Mobile Agent

Abstract

This electronic The widespread proliferation of Internet connections has made current computer networks more vulnerable to intrusions than before. In network intrusions, there may be multiple computing nodes that are attacked by intruders. The evidences of intrusions have to be gathered from all such attacked nodes. An intruder may move between multiple nodes in the network to conceal the origin of attack, or misuse some compromised hosts to launch the attack on other nodes. To detect such intrusion activities spread over the whole network, we present a new intrusion detection system (IDS) called Distributed Intrusion Detection using Mobile Agents (DIDMA). DIDMA uses a set of software entities called mobile agents that can move from one node to another node within a network, and perform the task of aggregation and correlation of the intrusion related data that it receives from another set of software entities called the static agents. Mobile agents reduce network bandwidth usage by moving data analysis computation to the location of the intrusion data, support heterogeneous plat-forms, and offer a lot of flexibility in creating a distributed IDS. DIDMA utilizes the above-mentioned beneficial features offered by mobile agent technology and addresses some of the issues with centralized IDS models. The detailed architecture and implementation of a prototype of DIDMA are described. It has been tested using some well-known attacks and performances have been com-pared with centralized IDS models.

Authors and Affiliations

Trushna Tushare Khos Patil, C. O. Banchhor

Keywords

Related Articles

An Improved Performance of MANET using AODV Protocol for Black Hole Detection

Routing attacks have been identified for single path routing in wireless ad hoc networks. The effects of routing attacks on multipath routing have not been addressed so far. In this paper, an approach have been propo...

LOAD Balancer Strategy Based On Cloud Computing

At present cloud computing is one of the utmost platform which delivers storage of data in very lower cost and accessible for all time over the internet. But it has more serious issue like security, load management a...

Representing Competent Revocable Data Access Influence for Multi-Authority Cloud Storage

Cloud computing is rising immensely because of its points of interest and the adaptable storage administrations provided by it. Because of this the quantity of clients has come to at the top. Clearly the clients will...

A New Filtering Technique for Reducing Speckle Noise From Ultrasound Images

Noise is the annoying problem in the field of image processing. In Medical image such as Ultrasound image, MRI data and Radar Images are affected by different types of noise. So it is the major task to eliminate such...

Clustering For Non sentence Data Sets Using HFRECCA (Hierarchical Fuzzy Relational Eigenvector Centrality based Clustering Algorithm)

Clustering is the process of grouping or aggregating of data items. Sentence clustering mainly used in variety of applications such as classify and categorization of documents, automatic summary generation, organizin...

Download PDF file
  • EP ID EP27457
  • DOI -
  • Views 316
  • Downloads 7

How To Cite

Trushna Tushare Khos Patil, C. O. Banchhor (2012). Enhanced Intrusion Detection System with Mobile Agent. International Journal of Research in Computer and Communication Technology, 1(4), -. https://europub.co.uk/articles/-A-27457