Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
Omid Mahdi Ebadati E., Harleen Kaur, M. Afshar Alam
Pages - 38 - 45     |    Revised - 30-08-2010     |    Published - 30-10-2010
Volume - 4   Issue - 4    |    Publication Date - October  Table of Contents
Watermarking, Attacks, Luminance, DCT, DWT, Correlation coefficient
An Intrusion Detection System in network fetches the intrusions information from systems by using Mobile Agents aid. Intrusion Detection System detects intrusions based on the collected information and routes the intrusion. The intelligent decisions on communications, permit agents to gain their goals more efficiently and provide more survivability and security of an agent system. The proposed model showed a formal representation of information assurance in agent messaging over a dynamic network by probability of redundant routes. The proposed Intrusion Detection System, chase intruders and collect information by the Mobile Agents. Our propose architecture is an information exchange method and chasing intrusion along with a method by implementing Mobile Agents.
CITED BY (2)  
1 Divya, D., & Chugh, A. (2012). Honeymaze: a hybrid intrusion detection system. International Journal of Advances in Engineering & Technology, 4(1).
2 Kolli, M. K., & Arimanda, S. R. (2011). Performance study of security mechanism for mobile agent domain.
1 Google Scholar
2 Academic Index
3 CiteSeerX
4 refSeek
6 Socol@r
7 Scribd
8 slideshare
10 PdfSR
1 W. R. Cheswick, S. M. Bellovin. "Firewalls and Internet Security: Repelling the Wily Hacker,'' Addison Wesley Publishing Company (1994)
2 Northcutt, S. Intrusion Detection - The Big Picture. SANS Institute, 1999, www.sansstore.org.
3 Whitman, Michael, Herbert Mattord. Principles of Information Secuirty. Thomson, Canada, pp. 290-301 (2009)
4 Anderson, Ross. Security Engineering. Wiley, New York, pp. 387-388 (2001)
5 Kohlenberg, Toby (Ed.), Alder, Raven, Carter, Dr. Everett F. (Skip), Jr., Foster, James C., Jonkman Marty, Raffael, and Poor, Mike, "Snort IDS and IPS Toolkit," Syngress (2007)
6 Barbara, Daniel, Couto, Julia, Jajodia, Sushil, Popyack, Leonard, and Wu, Ningning, "ADAM: Detecting Intrusions by Data Mining," Proceedings of the IEEE Workshop on Information Assurance and Security, West Point, NY (2001)
7 M. Asaka, S. Okazawa, A. Taguchi and S. Goto. A method of tracing intruders by use of mobile agents. In 9th Annual Conference of the Internet Society (INET'99), 1999
8 G. G. Helmer, J. S. K. Wong, V. Honavar and L. Miller. Intelligent agents for intrusion detection. In IEEE Information Technology Conference, 1998
9 W. Jansen, P. Mell, T. Karygiannis and D. Marks. Mobile agents in intrusion detection and response. In 12th Annual Canadian Information Technology Security Symposium, 2000
10 R.Gray, David Kotz, George Cybenko and Daniela Rus, "Security in a multiple-language mobile-agent system,'' In Giovanni Vigna (Ed.), Lecture Notes in Computer Science: Mobile Agents and Security, 1998
11 W. R. Cheswick, S. M. Bellovin. "Firewalls and Internet Security: Repelling the Wily Hacker”. Addison Wesley Publishing Company (1994)
12 Computer Operations, Audit, and Security Technology (COAST). "Introduction to Intrusion Detection”, www.cs.purdue.edu/coast/intrusion-detection/introduction.html
13 Computer Security Institute. "The Cost of Computer Crime”, www.gocsi.com/losses.htm.
14 Computer Security Institute. “Intrusion Detection Resources”, www.gocsi.com/intrusion.htm.
15 Wayne Jansen, Peter Mell, “Applying Mobile Agents to Intrusion Detection and Response”. NIST Interim Report, 1999
16 M. Eid. “A new Mobile Agent-based Intrusion Detection System Using Distributed Sensors”. In Third FEA Student conference, American University of Beirut, 2005
17 Omid Mahdi Ebadati E., Harleen Kaur and M. Afshar Alam.“A Secure Confidence Routing Mechanism Using Network-based Intrusion Detection Systems”. In Second International Conference on Wireless Information Networks & Business information System (WINBIS’10), Nepal, 2010
18 Christopher Krugel, Thomas Toth. “Applying Mobile Agent Technology to Intrusion Detection”. In ICSE Workshop on Software Engineering and Mobility”, 2001
19 Midori Asaka, Shunji Okazawa and Atsushi Taguchi. “A Method of Tracing Intruders by Use of Mobile Agents”, Wasedo University, 1999
20 “Jumping Beans Security,” Ad Astra Engineering, www.jumpingbeans.com/Security.htm
21 Lali Barri`ere, Paola Flocchini, Pierre Fraigniaud, and Nicola Santoro. “Capture of an Intruder by Mobile Agents”. In SPAA’02, Winnipeg, Manitoba, Canada, 2002
22 D. Bienstock, P. Seymour. Monotonicity in graph searching. Journal of Algorithms, 12, 239- 245, 1991
23 J. Ellis, H. Sudborough, J. Turner. The vertex separation and search number of a graph. Information and Computation, 113(1):50-79, 1994
24 Wayne A. Jansen. “Intrusion Detection with Mobile Agents”. Mobile Agents Systems, National Institute of Standards and Technology, 2002, www.nist.gov
Mr. Omid Mahdi Ebadati E.
- India
Mr. Harleen Kaur
- India
Mr. M. Afshar Alam
- India