IEEE Transactions on Software Engineering - Special issue on computer security and privacy
A survey of process migration mechanisms
ACM SIGOPS Operating Systems Review
A denial-of-service resistant intrusion detection architecture
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
The Impact of the Coordination Model in the Design of Mobile Agent Applications
COMPSAC '98 Proceedings of the 22nd International Computer Software and Applications Conference
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Mobile Agent Security and Telescript
COMPCON '96 Proceedings of the 41st IEEE International Computer Conference
A prototype real-time intrusion-detection expert system
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Itinerant Agents for Mobile Computing
IEEE Communications Surveys & Tutorials
Cooperating security managers: a peer-based intrusion detection system
IEEE Network: The Magazine of Global Internetworking
Using mobile agents as roaming security guards to test and improve security of hosts and networks
Proceedings of the 2004 ACM symposium on Applied computing
Attack abstraction using a multiagent system for intrusion detection
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology
Theoretical Computer Science
SMASH: Modular Security for Mobile Agents
Software Engineering for Multi-Agent Systems V
Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks
Computer Communications
Security applications of trust in multi-agent systems
Journal of Computer Security
KES-AMSTA'11 Proceedings of the 5th KES international conference on Agent and multi-agent systems: technologies and applications
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Mobile agents for network intrusion resistance
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Securing agents against malicious host in an intrusion detection system
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Correlation in distributed intrusion detection system using mobile agent
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Applications of agent technology in communications: a review
Computer Communications
Agent Driven Delay and Power Constrained Multicast Routing in Mobile Ad Hoc Networks by Using ANFIS
Wireless Personal Communications: An International Journal
Hi-index | 0.25 |
Implementing an effective intrusion detection capability is an elusive goal, not solved easily or with a single mechanism. However, we argue that mobile agent technology goes a long way toward realizing the ideal behavior desired in an intrusion detection system (IDS). This paper discusses various ways in which mobile agents could be applied to the problem of detecting and responding to intrusions. The paper looks not only at the benefits derived from mobility, but also at those associated with software agents in general. After exploring these benefits, we outline a number of ways to apply mobile agent technology in addressing the shortcomings of current IDS designs and implementations, and delineate the associated security issues involved. We also look at several new approaches for automated responses to an intrusion, once detected.