CFP last date
20 January 2025
Reseach Article

A Real Time Host and Network Mobile Agent based Intrusion Detection System (HNMAIDS)

by Abhijit Dwivedi, Y.k.rana, B.p.patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 12
Year of Publication: 2015
Authors: Abhijit Dwivedi, Y.k.rana, B.p.patel
10.5120/19881-1895

Abhijit Dwivedi, Y.k.rana, B.p.patel . A Real Time Host and Network Mobile Agent based Intrusion Detection System (HNMAIDS). International Journal of Computer Applications. 113, 12 ( March 2015), 33-40. DOI=10.5120/19881-1895

@article{ 10.5120/19881-1895,
author = { Abhijit Dwivedi, Y.k.rana, B.p.patel },
title = { A Real Time Host and Network Mobile Agent based Intrusion Detection System (HNMAIDS) },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 12 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 33-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number12/19881-1895/ },
doi = { 10.5120/19881-1895 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:50:47.484609+05:30
%A Abhijit Dwivedi
%A Y.k.rana
%A B.p.patel
%T A Real Time Host and Network Mobile Agent based Intrusion Detection System (HNMAIDS)
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 12
%P 33-40
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Computer security is to detect or prevent the process of collecting information or unauthorized access to computers. Detection is a recognition process which helps us to determine if someone tried to enter our system that have been successful, however, and what can be done. Prevention measures help us to pursue unauthorized users called as intruders from accessing any part of the computer system. Computer is being used for everything from banking and investment, businesses to communicate with others via email or messenger programs. Although It may not consider communications top secret, It probably do not want strangers reading email, using computer to attack or intrusion other systems, sending forged messages or email from computer, or examining personal information stored on our computer (such as financial statements). Intruders (also referred to as attackers, crackers) may not care about our identity. Often, they want to take control of the computer, so you can use it to launch attacks on the computer systems. So, they (attackers) hide the control of our computers from their true lease and launch attacks or intrusions, often against very high-profile computer systems like government or financial systems. This research is the study on computer security using proposed A Real Time Host and Network Mobile Agent based Intrusion Detection System (HNMAIDS) which will enhance efficiency as compare earlier agent based intrusion detection system. An Agent based intrusion detection system is intended to detect suspicious behavior on the network/host through agent, where agent will send an alerts signal to the network administrators and so an administrator can prevent intrusions as well as attacks. Presented results are showing the performance of the proposed HNMAIDS.

References
  1. Jitendra S Rathore, Praneet Saurabh, Bhupendra Verma "AgentOuro: A Novelty Based Intrusion Detection and Prevention System" Computational Intelligence and Communication Networks (CICN), Fourth International Conference on 2012.
  2. Zhang Ran "A Model of Collaborative Intrusion Detection System Based on Multi-agents" IEEE International Conference on (CSSS), 2012.
  3. Djemaa, B. ; Okba, K. "Intrusion detection system: Hybrid approach based mobile agent " IEEE International Conference on Education and e-Learning Innovations (ICEELI), 2012.
  4. Chetan R & Ashoka D. V "Data Mining Based Network Intrusion Detection System: A Database Centric Approach" International Conference on Computer Communication and Informatics (ICCCI), 2012.
  5. Rajashree Shedge and Lata Ragha " Hybrid Approach for Database Intrusion Detection with Reactive Policies" IEEE, 2012.
  6. Gidiya Priyanka V. , Ushir Kishori N, Mirza Shoeb A, Ikhankar Sagar D and Khivsara Bhavana A "A Proposed System for Network Intrusion Detection System Using Data Mining" IJCA, 2012.
  7. AnuradhaSainiand Neelam Malik "Agent-based Network Intrusion Detection System Using K-Means clustering algorithm" International Conference on Computing and Control Engineering (ICCCE), 2012.
  8. Kartit, Saidi, Bezzazi, El Marraki, Radi " A New Approach To Intrusion Detection System" Journal of Theoretical and Applied Information Technology, 2012.
  9. Chandolikar, N. S and Nandavadekar, V. D. "Efficient algorithm for intrusion attack classification by analyzing KDD Cup 99" Wireless and Optical Communications Networks (WOCN), 2012.
  10. P. Rama Subramanian and J. Wilfred Robinson2 "Alert Over the Attacks of Data Packet and Detect the Intruders" in International Conference on Computing, Electronics and Electrical Technologies [ICCEET] 2012.
  11. Jeevaa Katiravan, C. Chellappan and J. Gincy Rejula "Detecting the Source of TCP SYN Flood Attack using IP Trace Back" European Journal of Scientific Research, 2012.
  12. Taisir Eldos, Mohammad Khubeb Siddiqui And Aws Kanan "On The Kdd'99 Dataset: Statistical Analysis For Feature Selection" Journal Of Data Mining And Knowledge Discovery, 2012.
  13. V. Jyothsna, V. V. Rama Prasad and K. Munivara Prasad "A Review of Anomaly based Intrusion Detection Systems" International Journal of Computer Applications, 2011.
  14. Asmaa Shaker Ashoor and Prof. Sharad Gore "Importance of Intrusion Detection System (IDS)" International Journal of Scientific & Engineering Research, 2011.
  15. Firkhan Ali Bin Hamid Ali and Yee Yong Len "Development of Host Based Intrusion Detection System for Log Files" IEEE symposium on business, engineering and industrial application (ISBEIA) Langkawi, Malaysia 2011.
  16. Chung-Ming Ou and C. R. Ou "Immunity-inspired Host-based Intrusion Detection Systems" 2011.
  17. Ferdous A. Barbhuiya, Santosh Biswas, Neminath Hubballi and Sukumar Nandi "A Host Based DES Approach for Detecting ARP Spoofing" IEEE, 2011.
  18. Bin Zeng, Lu Yao, ZhiChen Chen "A Network Intrusion Detection System with the Snooping Agents" IEEE International Conference on Computer Application and System Modeling (ICCASM) 2010.
  19. LIN Ying, ZHANG Yan and OU Yang-Jia "The Design and Implementation of Host-based Intrusion Detection System" Third IEEE International Symposium on Intelligent Information Technology and Security Informatics 2010.
  20. Chundong Wang, Quancai Deng, Qing Chang,Hua Zhang and Huaibin Wang " A New Intrusion Detection System Based on Protocol Acknowledgement" IEEE 2010.
  21. Jianping Zeng and Donghui Guo "Agent-based Intrusion Detection for Network-based Application" International Journal of Network Security, 2009.
  22. Renuka Prasad. , Dr. Annamma Abraham, Chandan Prabhanjan, AjayBilotia "Information Extraction for Offline Traffic Anomaly Detection in NIDS" International Journal of Computer Science and Network Security, 2008.
  23. Martin Rehak, Michal Pechoucek, Pavel Celeda, Jiri Novotny, Pavel Minarik "CAMNEP: Agent-Based Network Intrusion Detection System" International Conference on Autonomous Agents and Multiagent Systems, 2008.
  24. Jin-Tae Oh , Sang-Kil Park, Jong-Soo Jang and Yong-Hee Jeon "Detection of DDoS and IDS Evasion Attacks in a High-Speed Networks Environment" published in IJCSNS International Journal of Computer Science and Network Security, 2007
  25. Moad Alhamaty, Ali Yazdian and Fathi Al-qadasi "Intrusion Detection System Based On The Integrity of TCP Packet" World Academy of Science, Engineering and Technology, 2007.
  26. T. S. Sobh "Wired and wireless intrusion detection system Classifications, good characteristics and state-of-the-art", Computer Standards & Interfaces, Science Direct, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System (IDS) Agent Based Network security(NS) Layers Attacks Network Intrusion Detection System (NIDS) Host Intrusion Detection System (HIDS).