CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Enhanced Intrusion Detection System for Mobile Adhoc Networks using Mobile Agents with no Manager

by Taran Singh Bharati
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 111 - Number 10
Year of Publication: 2015
Authors: Taran Singh Bharati
10.5120/19577-1380

Taran Singh Bharati . Enhanced Intrusion Detection System for Mobile Adhoc Networks using Mobile Agents with no Manager. International Journal of Computer Applications. 111, 10 ( February 2015), 33-35. DOI=10.5120/19577-1380

@article{ 10.5120/19577-1380,
author = { Taran Singh Bharati },
title = { Enhanced Intrusion Detection System for Mobile Adhoc Networks using Mobile Agents with no Manager },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 111 },
number = { 10 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 33-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume111/number10/19577-1380/ },
doi = { 10.5120/19577-1380 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:47:33.456314+05:30
%A Taran Singh Bharati
%T Enhanced Intrusion Detection System for Mobile Adhoc Networks using Mobile Agents with no Manager
%J International Journal of Computer Applications
%@ 0975-8887
%V 111
%N 10
%P 33-35
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now days everything is communicated via network because everybody is running a short of time. There are so many types of networks but in wireless network when data moves from one place to another, then it becomes susceptible to vulnerabilities. So there is need of secure transmission among the users. In the mobile adoc networks, moving nodes make a network with no special infrastructure and they communicate each other. So communication can be made more secure with the help of mobile agents which are the small programs which collect information from the nodes and send this information to the place where it is decided whether not there is an intrusion into the system.

References
  1. K. Xiao, J. Zheng, X. Wang, and X. Xue, "A Novel Peer-to-Peer Intrusion Detection System Using Mobile Agents in MANETs," vol. 2, 2005.
  2. Li, Yinan, and Zhihong Qian. "Mobile agents-based intrusion detection system for mobile ad hoc networks. " In Innovative Computing & Communication, 2010 Intl Conf on and Information Technology & Ocean Engineering, 2010 Asia-Pacific Conf on (CICC-ITOE), pp. 145-148. IEEE, 2010.
  3. Barika, F. A. , N. El Kadhi, and K. Ghedira. "MA_IDS: Mobile agents for intrusion detection system. " In Advance Computing Conference, 2009. IACC 2009. IEEE International, pp. 900-910. IEEE, 2009.
  4. Bernardes, Mauro Cesar, and Edson dos Santos Moreira. "Implementation of an intrusion detection system based on mobile agents. " In Software Engineering for Parallel and Distributed Systems, 2000. Proceedings. International Symposium on, pp. 158-164. IEEE, 2000.
  5. Paez, Rafael, Cristina Satizabal, and Jordi Forne. "Cooperative itinerant agents (CIA): Security scheme for intrusion detection systems. " In Internet Surveillance and Protection, 2006. ICISP'06. International Conference on, pp. 26-26. IEEE, 2006.
  6. Boughaci, Dalila, Kamel Ider, and Sofiane Yahiaoui. "Design and implementation of a misused intrusion detection system using autonomous and mobile agents. " In Proceedings of the 2007 Euro American conference on Telematics and information systems, p. 12. ACM, 2007.
  7. Al-Hujailan, H. ; Al-Rodhaan, M. ; Al-Dhelaan, A. , "A cooperative intrusion detection scheme for clustered mobile ad hoc networks," Information Assurance and Security (IAS), 2011 7th International Conference on , vol. , no. , pp. 179,185, 5-8 Dec. 2011.
  8. Balasubramaniyan, J. S. ; Garcia-Fernandez, J. O. ; Isacoff, D. ; Spafford, E. ; Zamboni, D. , "An architecture for intrusion detection using autonomous agents," Computer Security Applications Conference, 1998. Proceedings. 14th Annual , vol. , no. , pp. 13,24, 7-11 Dec 1998.
  9. Y. Zhang and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," vol. 1, no. 212, 2000.
  10. Gutierrez, Sergio Armando, and John Willian Branch. "A preliminary application of mobile agents to intrusion detection. " In Security Technology (ICCST), 2013 47th International Carnahan Conference on, pp. 1-4. IEEE, 2013.
  11. Schulter, A. ; Reis, J. A. ; Koch, F. ; Westphall, C. B. , "A Grid-based Intrusion Detection System," Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN/ICONS/MCL 2006.
  12. Mukesh S. , Shivaratri N. G. ,"Advanced Concepts in Operating Systems: Distributed, Database, Multiprocessor Operating Systems," Tata McGraw Hill, 2003.
  13. Colouris, "Distributed Systems", Pearson ed. Tata McGraw Hill, 2003.
  14. M. K. Rafsanjani, A. A. Khavasi, and A. Movaghar, "An Efficient Method for Identifying IDS Agent Nodes by Discovering Compromised Nodes in MANET," 2009 Second Int. Conf. Comput. Electr. Eng. , pp. 625–629, 2009.
  15. Vijil, E. C. "Security issues in mobile agents. " PhD diss. , Master's thesis, Indian Institute of Technology, Bombay, 2002.
  16. L. Mechtri, F. D. Tolba, and S. Ghanemi, "MASID: Multi-Agent System for Intrusion Detection in MANET," 2012 Ninth Int. Conf. Inf. Technol. - New Gener. , pp. 65–70, Apr. 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile adhoc netwok intrusion detection system agent consensus.