skip to main content
10.1145/986537.986581acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
Article

A P2P intrusion detection system based on mobile agents

Published:02 April 2004Publication History

ABSTRACT

Traditional intrusion detection systems have a central coordinator with a static hierarchical architecture. We propose a peer-to-peer intrusion detection system that has no central coordinator. Our approach is like that of a "neighborhood watch". A virtual neighborhood is created where neighbors take on the task of looking out for each other. When an intrusion occurs they observe this intrusion and inform the residents about this intrusion and collectively take action. We use cooperating, mobile agents for intrusion detection. Each site periodically sends mobile agents to visit and check up on its neighbors and report back. When inconsistent or anomalous behavior is observed, the observer-neighbor initiates a voting process to take action against the compromised site.

References

  1. http://www.sims.berkeley.edu/research/how-much-info-2003/printable_report.pdfGoogle ScholarGoogle Scholar
  2. Porras, P. A. and Neumann, P. G. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances, National Information Systems Security Conference, October 1997.Google ScholarGoogle Scholar
  3. Balasubramaniyan, J., Garcia-Fernandez, J. O., Isacoff, D., Spafford, E. H., and Zamboni, D. An Architecture for Intrusion Detection using Autonomous Agents, Department of Computer Science, Purdue University: Coast TR, 98-05, 1998.Google ScholarGoogle Scholar
  4. Staniford-Chen, S., Cheung, S., et. al., GrIDS -- A Graph Based Intrusion Detection System for Large Networks, In the Proceedings of the 19th National Information Computer Security Conference (Baltimore, MD), October 1996.Google ScholarGoogle Scholar
  5. G. White, E. Fisch, and U. Pooch. Cooperating security managers: A peer-based intrusion detection system, IEEE Net-work, vol. 10, no. 1, pp. 20--23, 1994.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jansen, W., Mell, P., and Karygiannis, T., Marks, D. Mobile Agents in Intrusion Detection and Response, In the proceedings of the 12th Annual Canadian Information Technology Security Symposium, Ottawa, Canada, June 2000.Google ScholarGoogle Scholar
  7. Hegazy, I. M., Al-Arif, T., Fayed, Z. T. and Faheem, H. M. A multi-agent based system for intrusion detection, IEEE Potentials, Page 28--31, October/November 2003.Google ScholarGoogle Scholar
  1. A P2P intrusion detection system based on mobile agents

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ACM-SE 42: Proceedings of the 42nd annual Southeast regional conference
          April 2004
          485 pages
          ISBN:1581138709
          DOI:10.1145/986537
          • General Chair:
          • Seong-Moo Yoo,
          • Program Chair:
          • Letha Hughes Etzkorn

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 2 April 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate178of377submissions,47%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader