Enhanced Intrusion Detection System with Mobile Agent
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 4
Abstract
This electronic The widespread proliferation of Internet connections has made current computer networks more vulnerable to intrusions than before. In network intrusions, there may be multiple computing nodes that are attacked by intruders. The evidences of intrusions have to be gathered from all such attacked nodes. An intruder may move between multiple nodes in the network to conceal the origin of attack, or misuse some compromised hosts to launch the attack on other nodes. To detect such intrusion activities spread over the whole network, we present a new intrusion detection system (IDS) called Distributed Intrusion Detection using Mobile Agents (DIDMA). DIDMA uses a set of software entities called mobile agents that can move from one node to another node within a network, and perform the task of aggregation and correlation of the intrusion related data that it receives from another set of software entities called the static agents. Mobile agents reduce network bandwidth usage by moving data analysis computation to the location of the intrusion data, support heterogeneous plat-forms, and offer a lot of flexibility in creating a distributed IDS. DIDMA utilizes the above-mentioned beneficial features offered by mobile agent technology and addresses some of the issues with centralized IDS models. The detailed architecture and implementation of a prototype of DIDMA are described. It has been tested using some well-known attacks and performances have been com-pared with centralized IDS models.
Authors and Affiliations
Trushna Tushare Khos Patil, C. O. Banchhor
An Improved Security Approach For User authentication
A Key logger is software intended to imprison all of a user’s keyboard strokes, and then create use of them to mimic a user in financial transactions. Threats next to electronic and financial services can be secret in...
Advanced Power Allocation in OFDM Systems
In this project, we propose a power allocation strategy by utilizing the duality gap in OFDM systems for the maximization of the sum of data rates at all subcarriers. In order to achieve the maximum capacity, the prop...
Hadoop Map Reduce Job Scheduler Implementation and Analysis in Heterogeneous Environment
Hadoop MapReduce is one of the popular framework for BigData analytics. MapReduce cluster is shared among multiple users with heterogeneous workloads. When jobs are concurrently submitted to the cluster, resources ar...
Functioning Estimation of Tcp Variants and Directing Etiquettes in Flexible Ad-Hoc Set of Connections
Mobile Ad-hoc Network (MANET) is an accumulation of cell phones rapidly shaping a correspondence system with no brought together control and prior system foundation. Because of the vicinity of versatility in the MANE...
A Comparative Study for Slot-Loaded Compact Microstrip Antennas by Using Methods Based on FDTD, FEM and MoM
A comparativestudy on the performance of the computational electromagnetic methods (CEMs) namely finite difference time domain (FDTD), finite element method (FEM) and moment method (MoM) via their corresponding elect...