Towards the automatic generation of mobile agents for distributed intrusion detection system

  • Authors:
  • Yanxin Wang;Smruti Ranjan Behera;Johnny Wong;Guy Helmer;Vasant Honavar;Les Miller;Robyn Lutz;Mark Slagell

  • Affiliations:
  • Department of Computer Science, Iowa State University, Ames, IA 50011, United States;Department of Computer Science, Iowa State University, Ames, IA 50011, United States;Department of Computer Science, Iowa State University, Ames, IA 50011, United States;Department of Computer Science, Iowa State University, Ames, IA 50011, United States;Department of Computer Science, Iowa State University, Ames, IA 50011, United States;Department of Computer Science, Iowa State University, Ames, IA 50011, United States;Department of Computer Science, Iowa State University, Ames, IA 50011, United States;Department of Computer Science, Iowa State University, Ames, IA 50011, United States

  • Venue:
  • Journal of Systems and Software
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Mobile Agent Intrusion Detection System (MAIDS) is an agent based distributed Intrusion Detection System (IDS). A disciplined requirement engineering process is developed to build MAIDS. The starting point is a high level description of intrusions expressed as Software Fault Trees (SFTs). Then the SFTs are translated to Colored Petri Nets (CPNs) that specify the IDS design. Subsequently, the CPNs are implemented as software intrusion detection agents in the MAIDS agent system. By using SFT and CPN as the theoretical underpinnings, the design and implementation of MAIDS can be verified and the design and implementation errors can be substantially reduced. This paper presents a tool that automatically translates CPNs that specify IDS design into software intrusion detection agents in MAIDS. Together with the translator we have developed to convert SFTs that model intrusions into the CPN for IDS design, this tool can automatically generate intrusion detection software agents from a high level description of intrusions.