NISTIR 6416, Applying Mobile Agents to Intrusion Detection and Response
نویسندگان
چکیده
منابع مشابه
A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملApplying Intrusion Detection Systems To Wireless Sensor Networks
Wireless Sensor Networks (WSNs) have been employed in many real-world applications that greatly improve our life. by applying a genetic operator. However, the Intrusion detection systems in wireless sensor networks: A review. Intrusion Detection System (IDS) provides a solution to this problem by analysing the network in order to detect abnormal behaviour of the sensor node(s). A well designed ...
متن کاملDistributed Intrusion Detection System using Mobile Agents
The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS). Autonomous software agents, especially when equipped with mobility, promise an interesting design approach for such applications. We evaluate the implications of applying mobile agent technology to t...
متن کاملApplying Mobile Agent Technology to Intrusion Detection
The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS). Autonomous software agents, especially when equipped with mobility, promise an interesting design approach for such applications. We evaluate the implications of applying mobile agent technology to t...
متن کاملApplying Mobile Agents to Intrusion Detection and Response
interfaces Low Unpredictability Medium Knowledge sharing Medium Table 3: Architecture Research Area Ratings Research Objective 3: Use MA technology to overcome shortcomings of current IDS architectures. Research Area Rating Asynchronous execution and autonomy Medium Structure and composition High Adapting dynamically Medium Operating in a heterogeneous environments Low Robust and fault-tolerant...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999