Mobile Security Agents for Network Traffic Analysis
نویسنده
چکیده
This paper describes the implementation of a distributed agent architecture for intrusion detection and response in networked computers. Unlike conventional intrusion detection systems (IDS), this security system attempts to emulate mechanisms of the natural immune system using Java-based mobile software agents. These security agents monitor multiple levels (packet, process, system, and user) of networked computers to determine correlation among the observed anomalous patterns, reporting such abnormal behavior to the network administrator and/or possibly taking some action to counter a suspected security violation. The paper focuses on the design aspects of such an intrusion detection system by integrating different artificial intelligence techniques and a mobile agent architecture. Specifically, IBM’s Aglets Software Development Kit (ASDK) is used as the base agent architecture, along with Adaptive Resonance Theory (ART-2) neural networks for network pattern classification, and a fuzzy logic controller for decision/action resolution. The feasibility and implementation of the mobile security agent system is demonstrated and some preliminary results are reported.
منابع مشابه
Detecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملImproving Tor security against timing and traffic analysis attacks with fair randomization
The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...
متن کاملSecure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server model traditionally used to develop Internet applications. In this research, an Enhanced Role-based access control model (ERBAC) and an architecture for the ERBAC model are proposed. The architecture based on mobile agen...
متن کاملComparative Analysis of Detection and Prevention Security Techniques in Mobile Agents System
Mobile agent system is a distributed computing environment that is perceived as a flexible alternative to client server technology. Mobile agents can travel autonomously through a computer network in order to perform some computation or gather information on behalf of a human user or an application. This helps in reducing network traffic to a large extent. However, it has not become popular due...
متن کاملLAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System
Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is increasing steadily. The idea of filtering the traffic at the “entrance door” (by firewalls, for instance) is not completely successful since it does not allow monitoring of local traffic. This paper presents a lightweig...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001