POM - A Mobile Agent Security Model against Malicious Hosts
HPC '00 Proceedings of the The Fourth International Conference on High-Performance Computing in the Asia-Pacific Region-Volume 2 - Volume 2
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Snort 2.0 Intrusion Detection
An artificial immune based intrusion detection model for computer and telecommunication systems
Parallel Computing - Special issue: Parallel and nature-inspired computational paradigms and applications
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 6 - Volume 07
Design and Analysis of Experiments
Design and Analysis of Experiments
KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Intelligent agent based artificial immune system for computer security--a review
Artificial Intelligence Review
Optimization of Real-Valued Self Set for Anomaly Detection Using Gaussian Distribution
AICI '09 Proceedings of the International Conference on Artificial Intelligence and Computational Intelligence
Design and realization of concurrent processing system for network security event
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
Agent-based artificial immune system approach for adaptive damage detection in monitoring networks
Journal of Network and Computer Applications
Evolving boundary detector for anomaly detection
Expert Systems with Applications: An International Journal
GPC'10 Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing
Proceedings of the Winter Simulation Conference
Artificial immune system based mobile agent platform protection
Computer Standards & Interfaces
Hi-index | 0.25 |
There is a strong correlation between the human immune system and a computer network security system. The human immune system protects the human body from pathogenic elements in the same way that a computer security system protects the computer from malicious users. This paper presents a novel intrusion detection model based on artificial immune and mobile agent paradigms for network intrusion detection. The construction of the model is based on registries' signature analysis using both Syslog-ng and Logcheck unix tools. The tasks of monitoring, distributing intrusion detection workload, storing relevant information, and ensuring data persistence and reactivity have been carried out by the mobile agents, which represent the leukocytes of an artificial immune system. Our real-time based intrusion detection and communication model is host-based and adopts the anomaly detection paradigm. We present our intrusion detection model, discuss its implementation, and report on its performance evaluation using real data provided by an Internet Service Provider and a data processing corporation.