List of Journals    /    Call For Papers    /    Subscriptions    /    Login
 
 
 
 
 SEARCH
By Author By Title
 
 
ABOUT CSC
 About CSC Journals
 CSC Journals Objectives
 List of Journals
 CALL FOR PAPERS
 Call For Papers CFP
 Special Issue CFP
AUTHOR GUIDELINES
 Submission Guidelines
 Peer Review Process
 Helpful Hints For Getting Published
 Plagiarism Policies
 Abstracting & Indexing
 Open Access Policy
 Submit Manuscript
 FOR REVIEWERS
 Reviewer Guidelines
 FOR EDITORIAL
 Editor Guidelines
 Join Us As Editor
 Launch Special Issue
 Suggest New Journal
 CSC LIBRARY
 Browse CSC Library
 Open Access Policy
  SERVICES
 Conference Partnership Program (CPP)
 Abstracting & Indexing
 SUBSCRIPTIONS
 Subscriptions
 Discounted Packages
 Archival Subscriptions
 How to Subscribe
 Librarians
 Subscriptions Agents
 Order Form
 DOWNLOADS
 
 
 
 
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
Full text
 PDF(238.1KB)
Source 
International Journal of Security (IJS)
Table of Contents
Download Complete Issue    PDF(2.8MB)
Volume:  4    Issue:  4
Pages:  38-63
Publication Date:   October
ISSN (Online): 1985-2320
Pages 
38 - 45
Author(s)  
 
Published Date   
30-10-2010 
Publisher 
CSC Journals, Kuala Lumpur, Malaysia
ADDITIONAL INFORMATION
Keywords   Abstract   References   Cited by   Related Articles   Collaborative Colleague
 
KEYWORDS:   Watermarking, Attacks, Luminance, DCT, DWT, Correlation coefficient 
 
 
This Manuscript is indexed in the following databases/websites:-
1. Docstoc
2. Scribd
3. Directory of Open Access Journals (DOAJ)
4. PDFCAST
5. Google Scholar
6. refSeek
7. Academic Index
8. Socol@r
9. iSEEK
 
 
An Intrusion Detection System in network fetches the intrusions information from systems by using Mobile Agents aid. Intrusion Detection System detects intrusions based on the collected information and routes the intrusion. The intelligent decisions on communications, permit agents to gain their goals more efficiently and provide more survivability and security of an agent system. The proposed model showed a formal representation of information assurance in agent messaging over a dynamic network by probability of redundant routes. The proposed Intrusion Detection System, chase intruders and collect information by the Mobile Agents. Our propose architecture is an information exchange method and chasing intrusion along with a method by implementing Mobile Agents.  
 
 
 
1 W. R. Cheswick, S. M. Bellovin. "Firewalls and Internet Security: Repelling the Wily Hacker,'' Addison Wesley Publishing Company (1994)
2 Northcutt, S. Intrusion Detection - The Big Picture. SANS Institute, 1999, www.sansstore.org.
3 Whitman, Michael, Herbert Mattord. Principles of Information Secuirty. Thomson, Canada, pp. 290-301 (2009)
4 Anderson, Ross. Security Engineering. Wiley, New York, pp. 387-388 (2001)
5 Kohlenberg, Toby (Ed.), Alder, Raven, Carter, Dr. Everett F. (Skip), Jr., Foster, James C., Jonkman Marty, Raffael, and Poor, Mike, "Snort IDS and IPS Toolkit," Syngress (2007)
6 Barbara, Daniel, Couto, Julia, Jajodia, Sushil, Popyack, Leonard, and Wu, Ningning, "ADAM: Detecting Intrusions by Data Mining," Proceedings of the IEEE Workshop on Information Assurance and Security, West Point, NY (2001)
7 M. Asaka, S. Okazawa, A. Taguchi and S. Goto. A method of tracing intruders by use of mobile agents. In 9th Annual Conference of the Internet Society (INET'99), 1999
8 G. G. Helmer, J. S. K. Wong, V. Honavar and L. Miller. Intelligent agents for intrusion detection. In IEEE Information Technology Conference, 1998
9 W. Jansen, P. Mell, T. Karygiannis and D. Marks. Mobile agents in intrusion detection and response. In 12th Annual Canadian Information Technology Security Symposium, 2000
10 R.Gray, David Kotz, George Cybenko and Daniela Rus, "Security in a multiple-language mobile-agent system,'' In Giovanni Vigna (Ed.), Lecture Notes in Computer Science: Mobile Agents and Security, 1998
11 W. R. Cheswick, S. M. Bellovin. "Firewalls and Internet Security: Repelling the Wily Hacker”. Addison Wesley Publishing Company (1994)
12 Computer Operations, Audit, and Security Technology (COAST). "Introduction to Intrusion Detection”, www.cs.purdue.edu/coast/intrusion-detection/introduction.html
13 Computer Security Institute. "The Cost of Computer Crime”, www.gocsi.com/losses.htm.
14 Computer Security Institute. “Intrusion Detection Resources”, www.gocsi.com/intrusion.htm.
15 Wayne Jansen, Peter Mell, “Applying Mobile Agents to Intrusion Detection and Response”. NIST Interim Report, 1999
16 M. Eid. “A new Mobile Agent-based Intrusion Detection System Using Distributed Sensors”. In Third FEA Student conference, American University of Beirut, 2005
17 Omid Mahdi Ebadati E., Harleen Kaur and M. Afshar Alam.“A Secure Confidence Routing Mechanism Using Network-based Intrusion Detection Systems”. In Second International Conference on Wireless Information Networks & Business information System (WINBIS’10), Nepal, 2010
18 Christopher Krugel, Thomas Toth. “Applying Mobile Agent Technology to Intrusion Detection”. In ICSE Workshop on Software Engineering and Mobility”, 2001
19 Midori Asaka, Shunji Okazawa and Atsushi Taguchi. “A Method of Tracing Intruders by Use of Mobile Agents”, Wasedo University, 1999
20 “Jumping Beans Security,” Ad Astra Engineering, www.jumpingbeans.com/Security.htm
21 Lali Barri`ere, Paola Flocchini, Pierre Fraigniaud, and Nicola Santoro. “Capture of an Intruder by Mobile Agents”. In SPAA’02, Winnipeg, Manitoba, Canada, 2002
22 D. Bienstock, P. Seymour. Monotonicity in graph searching. Journal of Algorithms, 12, 239- 245, 1991
23 J. Ellis, H. Sudborough, J. Turner. The vertex separation and search number of a graph. Information and Computation, 113(1):50-79, 1994
24 Wayne A. Jansen. “Intrusion Detection with Mobile Agents”. Mobile Agents Systems, National Institute of Standards and Technology, 2002, www.nist.gov
 
 
 
 
 
 
 
 
Omid Mahdi Ebadati E. : Colleagues
Harleen Kaur : Colleagues
M. Afshar Alam : Colleagues  
 
 
 
  Untitled Document
 
Copyrights (c) 2012 Computer Science Journals. All rights reserved.
Best viewed at 1152 x 864 resolution. Microsoft Internet Explorer.
 
  
 
Copyrights & Usage: Articles published by CSC Journals are Open Access. Permission to copy and distribute any other content, images, animation and other parts of this website is prohibited. CSC Journals has the rights to take action against individual/group if they are found victim of copying these parts of the website.