CFP last date
20 January 2025
Reseach Article

Distributed Intrusion Detection using Mobile Agent in Distributed System

Published on April 2012 by Kuldeep Jachak, Ashish Barua
Emerging Trends in Computer Science and Information Technology (ETCSIT2012)
Foundation of Computer Science USA
ETCSIT - Number 3
April 2012
Authors: Kuldeep Jachak, Ashish Barua
b171de51-762d-4352-ab36-504ef76824fb

Kuldeep Jachak, Ashish Barua . Distributed Intrusion Detection using Mobile Agent in Distributed System. Emerging Trends in Computer Science and Information Technology (ETCSIT2012). ETCSIT, 3 (April 2012), 1-6.

@article{
author = { Kuldeep Jachak, Ashish Barua },
title = { Distributed Intrusion Detection using Mobile Agent in Distributed System },
journal = { Emerging Trends in Computer Science and Information Technology (ETCSIT2012) },
issue_date = { April 2012 },
volume = { ETCSIT },
number = { 3 },
month = { April },
year = { 2012 },
issn = 0975-8887,
pages = { 1-6 },
numpages = 6,
url = { /proceedings/etcsit/number3/5974-1017/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Emerging Trends in Computer Science and Information Technology (ETCSIT2012)
%A Kuldeep Jachak
%A Ashish Barua
%T Distributed Intrusion Detection using Mobile Agent in Distributed System
%J Emerging Trends in Computer Science and Information Technology (ETCSIT2012)
%@ 0975-8887
%V ETCSIT
%N 3
%P 1-6
%D 2012
%I International Journal of Computer Applications
Abstract

Due to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. There is tremendous rise in attacks on wired and wireless LAN. Therefore security of Distributed System (DS) is become serious challenge. One such serious challenge in DS security domain is detection of rogue points in network. Lot of work has been done in detection of intruders. But the solutions are not satisfactory. This paper gives the new idea for detecting rouge point using Mobile agent. Mobile agent technology is best suited for audit information retrieval which is useful for the detection of rogue points. Using Mobile agent we can find the intruder in DS as well as controller can take corrective action. This paper presents DIDS based on Mobile agents and band width consumed by the Mobile Agent for intrusion detection

References
  1. M. Eid. 2004. "A New Mobile Agent-Based Intrusion detection System Using distributed Sensors", In proceeding of FEASC.
  2. Mohammad Zulkernine. 2005. "DIDMA: A Distributed Intrusion Detection System Using Mobile Agents" proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN'05)
  3. White G, Fisch E, and Pooch U. 1994. "Cooperating security managers: A peer-based intrusion detection system," IEEE Network, 10(1): 20—23.
  4. J. Balasubramaniyan, J. O. G. Fernandez, D. Isacoff, E. H. Spafford, and D. Zamboni, "An Architecture for Intrusion detection is using Autonomous Agents," Technical report no. TR 98-05, Purdue University, USA, 1998.
  5. M. Asaka, S. Okazawa, A. Taguchi, and S. Goto. 1999. "A Method of Tracing Intruders by Use of Mobile Agents," INET '99, San Jose, USA, June 1999.
  6. N. Foukia, J. Hulaas, and J. Harms, "Intrusion Detection with Mobile Agents," Proceedings of the 11th Annual Internet Society Conference (INET 2001), Stockholm, Sweden, June 2001.
  7. G. Helmer, J. Wong, Y. Wang, V. Honavar, and Les Miller , "Lightweight Agents for Intrusion Detection," Journal of Systems and Software, Elsevier, vol. 67, pp. 109- 122, 2003.
  8. Shao-Chun Zhong, Qing-Feng Song, Xiao-Chun Cheng, and Yan Zhang, "A safe mobile agent system for distributed intrusion detection," Proc. of the International Conference on Machine Learning and Cybernetics, vol. 4, pp. 2009 – 2014, Nov. 2003.
  9. Recursion Software Inc, "Voyager ORB Developer's Guide," www. objectspace. com, http://www. ifi. unizh. ch/ddis/staff/vorburg/doc/Orb/index. htm
  10. Bernardes, M. C and dos Santos Moreira, E. , "Implementation of an intrusion detection system based on mobile agents," Proc. of the International Symposium on Software Engineering for Parallel and Distributed Systems, pp. 158-164 June 2000.
  11. W. Jansen, P. Mell, T. Karygiannis, D. Marks "Mobile Agents in Intrusion Detection and Response" National Institute for Standards and TechnologyGaithersburg, MD 20815
  12. A. V. Dhaygude, K. R. Patil, A. A. Sawant "Threats to Wireless Local Area Network (WLAN) And Countermeasures" ICONS'07, January 27-29, 2007, Erode,Tamilnadu,India.
  13. Wei Wei, Kyoungwon Suh,Bing Wang . "Passive Online Rogue Access Point Detection Using Sequential Hypothesis Testing with TCP ACK-Pairs",IMC'07, October 24-26, 2007, San Diego, California, USA
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Agent Intrusion Detection System Distributed System Rouge Point