Home   >   CSC-OpenAccess Library   >    Manuscript Information
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
Omid Mahdi Ebadati E., Harleen Kaur, M. Afshar Alam
Pages - 38 - 45     |    Revised - 30-08-2010     |    Published - 30-10-2010
Volume - 4   Issue - 4    |    Publication Date - October  Table of Contents
MORE INFORMATION
KEYWORDS
Watermarking, Attacks, Luminance, DCT, DWT, Correlation coefficient
ABSTRACT
An Intrusion Detection System in network fetches the intrusions information from systems by using Mobile Agents aid. Intrusion Detection System detects intrusions based on the collected information and routes the intrusion. The intelligent decisions on communications, permit agents to gain their goals more efficiently and provide more survivability and security of an agent system. The proposed model showed a formal representation of information assurance in agent messaging over a dynamic network by probability of redundant routes. The proposed Intrusion Detection System, chase intruders and collect information by the Mobile Agents. Our propose architecture is an information exchange method and chasing intrusion along with a method by implementing Mobile Agents.
CITED BY (2)  
1 Divya, D., & Chugh, A. (2012). Honeymaze: a hybrid intrusion detection system. International Journal of Advances in Engineering & Technology, 4(1).
2 Kolli, M. K., & Arimanda, S. R. (2011). Performance study of security mechanism for mobile agent domain.
1 Google Scholar 
2 Academic Index 
3 CiteSeerX 
4 refSeek 
5 iSEEK 
6 Socol@r  
7 Scribd 
8 SlideShare 
9 PDFCAST 
10 PdfSR 
Anderson, Ross. Security Engineering. Wiley, New York, pp. 387-388 (2001)
“Jumping Beans Security,” Ad Astra Engineering, www.jumpingbeans.com/Security.htm
Barbara, Daniel, Couto, Julia, Jajodia, Sushil, Popyack, Leonard, and Wu, Ningning, "ADAM: Detecting Intrusions by Data Mining," Proceedings of the IEEE Workshop on Information Assurance and Security, West Point, NY (2001)
Christopher Krugel, Thomas Toth. “Applying Mobile Agent Technology to Intrusion Detection”. In ICSE Workshop on Software Engineering and Mobility”, 2001
Computer Operations, Audit, and Security Technology (COAST). "Introduction to Intrusion Detection”, www.cs.purdue.edu/coast/intrusion-detection/introduction.html
Computer Security Institute. "The Cost of Computer Crime”, www.gocsi.com/losses.htm.
Computer Security Institute. “Intrusion Detection Resources”, www.gocsi.com/intrusion.htm.
D. Bienstock, P. Seymour. Monotonicity in graph searching. Journal of Algorithms, 12, 239- 245, 1991
G. G. Helmer, J. S. K. Wong, V. Honavar and L. Miller. Intelligent agents for intrusion detection. In IEEE Information Technology Conference, 1998
J. Ellis, H. Sudborough, J. Turner. The vertex separation and search number of a graph. Information and Computation, 113(1):50-79, 1994
Kohlenberg, Toby (Ed.), Alder, Raven, Carter, Dr. Everett F. (Skip), Jr., Foster, James C., Jonkman Marty, Raffael, and Poor, Mike, "Snort IDS and IPS Toolkit," Syngress (2007)
Lali Barri`ere, Paola Flocchini, Pierre Fraigniaud, and Nicola Santoro. “Capture of an Intruder by Mobile Agents”. In SPAA’02, Winnipeg, Manitoba, Canada, 2002
M. Asaka, S. Okazawa, A. Taguchi and S. Goto. A method of tracing intruders by use of mobile agents. In 9th Annual Conference of the Internet Society (INET'99), 1999
M. Eid. “A new Mobile Agent-based Intrusion Detection System Using Distributed Sensors”. In Third FEA Student conference, American University of Beirut, 2005
Midori Asaka, Shunji Okazawa and Atsushi Taguchi. “A Method of Tracing Intruders by Use of Mobile Agents”, Wasedo University, 1999
Northcutt, S. Intrusion Detection - The Big Picture. SANS Institute, 1999, www.sansstore.org.
Omid Mahdi Ebadati E., Harleen Kaur and M. Afshar Alam.“A Secure Confidence Routing Mechanism Using Network-based Intrusion Detection Systems”. In Second International Conference on Wireless Information Networks & Business information System (WINBIS’10), Nepal, 2010
R.Gray, David Kotz, George Cybenko and Daniela Rus, "Security in a multiple-language mobile-agent system,'' In Giovanni Vigna (Ed.), Lecture Notes in Computer Science: Mobile Agents and Security, 1998
W. Jansen, P. Mell, T. Karygiannis and D. Marks. Mobile agents in intrusion detection and response. In 12th Annual Canadian Information Technology Security Symposium, 2000
W. R. Cheswick, S. M. Bellovin. "Firewalls and Internet Security: Repelling the Wily Hacker,'' Addison Wesley Publishing Company (1994)
W. R. Cheswick, S. M. Bellovin. "Firewalls and Internet Security: Repelling the Wily Hacker”. Addison Wesley Publishing Company (1994)
Wayne A. Jansen. “Intrusion Detection with Mobile Agents”. Mobile Agents Systems, National Institute of Standards and Technology, 2002, www.nist.gov
Wayne Jansen, Peter Mell, “Applying Mobile Agents to Intrusion Detection and Response”. NIST Interim Report, 1999
Whitman, Michael, Herbert Mattord. Principles of Information Secuirty. Thomson, Canada, pp. 290-301 (2009)
Mr. Omid Mahdi Ebadati E.
- India
omidit@gmail.com
Mr. Harleen Kaur
- India
Mr. M. Afshar Alam
- India


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS