Intelligent Mobile Agent for Intrusion Detection System (IMAIDS)
نویسندگان
چکیده
IMAIDS is carried out by five 4th year students, Réginald Lips, Nicolas Carlier, Damien Molot, Jean-Marie Peschoux and Alexandre Luciani, from Epitech (European Institute of Technology; http: // www. epitech. net/ ), within the framework of their end
منابع مشابه
Using correlation engine and mobile agents for intrusion detection
IMAIDS project (Intelligent Mobile Agent for Intrusion Detection System) is carried out by five 5th year students, Réginald Lips, Nicolas Carlier, Damien Molot, Jean-Marie Peschoux and Alexandre Luciani, from Epitech (European Institute of Technology; http: // www. epitech. net/ ), within the framework of their end of studies project. The purpose of this document is to present a part of our res...
متن کاملUsing Correlation Detection for IMA-IDS Architecture
This paper presents a new syntactic and semantic representation for network events. Our goal is to offer to IMA-IDS (Intelligent and Mobile Agent Intrusion Detection System), an efficient correlation engine. IMAIDS is a global architecture for using intelligent and mobile agent for intrusion detection system. As described widely in [1] this architecture aims at taking advantages of agent mobili...
متن کاملIntelligent Agents for Intrusion Detection System (iaids)
This paper presents a distributed wireless intrusion detection system (IDS) based on Intelligent agents. Intelligent agents are randomly traveled in difference nodes which are connected with the network. Each agent may perform specific tests (like mobile sensors). When the test indicates some possibility of an intrusion, the agent may ask for additional tests at the site. Only after the suspici...
متن کاملIntelligent Agents for Distributed Intrusion Detection System
This paper presents a distributed intrusion detection system IDS, based on the concept of specialized distributed agents community representing agents with the same purpose for detecting distributed attacks. The semantic of intrusion events occurring in a predetermined network has been defined. The correlation rules referring the process which our proposed IDS combines the captured events that ...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کامل