Distributed agent architecture for intrusion detection based on new metrics Farah Barika KTATA2 , Nabil EL KADHI1 , Khaled GHEDIRA2 (1)Ahlia University Bahrein-ECCE Dept. Chairman and LERIA EPITECH France Email:[email protected] (2)Higher Institute of Management-LI3: Laboratoire d’Ingenierie Informatique Intelligente Tunisia [email protected], [email protected]@isg.rnu.tn

Abstract—Current best practices for identifying malicious activity in a network are to deploy network intrusion detection systems. Anomaly detection approaches hold out more promise, as they can detect new types of intrusions because these new intrusions, by assumption, will deviate from ”normal” behavior. But these methods generally suffer from several major drawbacks: computing the anomaly model itself is a time-consuming and processor-heavy task. To avoid these limits, we propose a mobile agent based model for intrusion detection system, called MAFIDS, including new metrics issued from emergent indicators of the agent synergy and a proposed event correlation engine. We detail the implementation of our model showing its capabilities to detect the SYN Flooding attack in a short time and lower false alarm rate by comparing it to SNORT. Index Terms—Network Intrusion Detection System; Anomaly Detection Approach; Mobile Agent; Agent Synergy; Event Correlation Engine; SYN Flooding attack.

I. INTRODUCTION As computer attacks become more and more sophisticated, organizations today are keenly aware of the need to provide effective security and protect their information system. Among all security issues, intrusion is the most critical and widespread. Intrusion can be defined as any action that is not legally allowed for a user to take towards an information system, compromise, or cause harm to a network. Intrusion detection, appeared in 1980 [1], is a process of detecting and tracing inappropriate, incorrect, or anomalous activity targeted at computing and networking resources. Abstract intrusion detection model was proposed in 1987 by Denning [2]. Intrusion Detection System (IDS) is software that automates the intrusion detection process and detects possible intrusions. IDS are usually divided into two groups according to the analyzed events: • Host Based IDS (HIDS): perform their analysis on information collected at a single host by the audit trails. HIDS are designed for monitoring a single computer system looking very specifically at what is happening on that machine via the log files and/or the internal auditing systems. • Network Based IDS (NIDS): rely on information obtained by monitoring the stream of data exchanged between computers. NIDS are used to detect intrusions across an entire network. These systems must be placed in the network such that they can see all passing traffic.

The HIDS works above the network layer making it unable to detect some kind of attacks [3], while NIDS infer their decision from low-level network packets traveling among hosts. Detecting unknown intrusions in network traffic can be very complicated, whereas on a host there are more things to be looked at such as processes, network accesses, system calls made, etc. Moreover, there is a tradeoffs between NIDS and HIDS about attack resistance and visibility. Visibility makes evasion more difficult by increasing the range of analyzable events and decreasing the risk of having an incorrect view of system state. On one hand, HIDS provides good visibility [4]. However increasing the visibility of the target system to the IDS frequently comes at the cost of weaker isolation between the IDS and attacker and increases risk of direct attack on IDS. On the other hand, NIDS offer higher attack resistance instead of the cost of visibility. The usual approach for an IDS is to set up sensors to collect the data. Then to pass it to an analyzer component which will analyze the data and issue alert. This centralized approach, used in the most known products such as Snort [5] has several flows: • •

• • •

• • •

In case of a failure of a sensor there is no handover, This type of IDS is very sensitive to Denial of service attack [6]. Many IDS have hierarchical structures. This gives the opportunity to the attackers to harm the IDS by cutting off a control branch or even tacking out the root command. Unstable reaction to distributed attacks, Sensors capacity relays on computer hardware, which makes the capacity hard to extend, Security of each sensors has to be granted separately, there is no global security to ensure that each sensor is not corrupted and is authorized on the network, You need to update all the sniffer separately, Need of human expertise during all the working time, When an IDS is faced to a huge number of events in the network, it slows down a system or drop network packets that it don’t have time to process,

To eliminate such defects new approaches were applied to the detection process such as neural network [8], genetic algorithms [7] and agent approach [9]. Developing IDS it is also necessary to take into account con-

temporary computer distributed environment and distributed nature of attacks. For these reasons agents approach is more preferred for creating the security systems. We advocate the idea that agents framework enhance the performance of IDS and even offer them new capabilities. Moreover agent systems are used in various applications such as workflow, scheduling and optimization [10]. Agents is defined as a distinct software process, which can reason independently, and can react to change induced upon it by other agents and its environment, and is able to cooperate with other agents [11]. Agents are autonomous that can act independent from other agents and perform different tasks. They are also robust and fault-tolerant to changing environments. Agents can be mobile migrating from an agent place to another in order to perform the work locally. In an agent based IDS idea, there is no central node, therefore no central point of failure. Overcoming the deficiency of centralized structure is the major reason for using agents in the intrusions detection field. The agents usefulness includes also reduction of the network load, overcoming of network latency and support for disconnected operations [12]. Our research work covers two topics : The functional structure of IDS and analysis methods, particularly anomaly detection. In fact, IDS can be classified into two categories, according to the approach used in analyzing network events: those based on anomaly approach, and, those based on misuse approach. • Anomaly approach : it relies on models of the normal behavior of a computer system [2]. Behavior profiles may be focused on the users, the applications or the network. In this approach, to detect abnormal activity patterns, the predefined profile patterns are compared with the actual ones in use. The detected patterns will be considered as intrusions. • Misuse approach : relies on a set of attack descriptions, also called attack signatures [13]. These descriptions are matched to the stream of audit data, attempting to verify that the defined signature is occurring. Both anomaly and misuse approaches present advantages and disadvantages. An IDS based on misuse approach can detect only those attacks that have been defined. Anomaly approach enable us to detect attacks that are unknown in advance; this advantage causes a large number of false positives (false alarm) occurred when an IDS alerts an event that is not an intrusion [14]. Commercial IDS products such as NetRanger [15] and RealSecure [16] work on misuse approach. An ideal IDS offers a high attack detection rate, low detection delay and low false positive rate, but in practice this is hard to achieve. Detection rate is computed as the ratio of the number of correctly detected attacks to the total number of attacks, while false alarm rate is computed as the ratio of the number of normal connections (that is incorrectly misclassified as attacks) to the total number of normal connections. We are interested in detection delay, the time delay between when a change of network occurs and when the change is detected, which is an important metric for measuring the system responsiveness.

The main contributions of our work is the following: We propose a mobile agent based model for intrusion detection system, called MAFIDS (Mobile Agents For Intrusion Detection System), including new metrics issued from emergent indicators of the agent synergy. We detail the implementation of our model showing its capabilities to detect the SYN Flooding attack in a short time and a lower false alarm rate by comparing it to SNORT. For this purpose our paper is organized as follow: In section 2, we present a set of current IDS problems. In section 3, we present our proposed approach. Section 4 details the implementation and performance evaluation. Section 5 concludes the paper. II. C URRENT IDS PROBLEMS We are interested on IDS based on Anomaly approach using statistical methods. These systems have the advantage of being able to detect previously unknown attacks but they suffer from the difficulty to build a solid model of acceptable behavior and the high number of alarms caused by unusual but authorized activities. These IDS are not able to detect attacks scenarios which may occur over an extended period of time. For example, an exploit using a missing command in a session can only be identified when a session is completed and will necessitate keeping track of state and context [17]. This could affect the time performance of the IDS which corresponds to the total time that the IDS needs to detect an intrusion. Times need to be as short as possible in order to allow the security analyst sufficient time to react to an attack before much damage has been done, as well as to stop an attacker from modifying audit information or altering the IDS itself [18]. IDS designers must find ways to speed up their attack analysis techniques when monitoring a fully-saturated network with less number of false positives. Current IDS are not scalable and fast enough to keep up with the gigabit networks requirements of these days. Not fast enough because the statistical processing tend to be computationally expensive due to the fact that several metrics are often maintained, and need to be updated against every systems activity. Scalability is an issue since these systems depend on the network traffic behavior and we have networks today which have diverse and different requirements at times. Besides, one of the major problem with IDS based on statistical method for anomaly approach is that not all abrupt changes in the network are anomalies where as it declares anomaly to any abrupt changes. It is also difficult to determine the right threshold above which an anomaly is to be considered intrusive. In statistical algorithms, a bigger sampling or threshold increases the chance of false negatives, while smaller values increase the chance of false positives. Basically, These traditional methods select key statistics about network traffic as features for a model trained to recognize normal activity. Unfortunately, statistics such as packet arrival times and connection arrival times have much variation. Too much statistical variation makes models inaccurate and

events classified as anomalies may not always be malicious [19]. Moreover statistical analysis have the disadvantage that their statistical measures capturing user behavior can be trained gradually to a point where intrusive behavior is considered normal. III. P ROPOSED A PPROACH We propose a mobile agent based model for intrusion detection system, called MAFIDS, including new metrics issued from emergent indicators of the agent synergy. The underlying idea is to take advantage from agent technology to overcome two major problems of current IDS: a longer detection, higher false alarm rate.

A. Distributed Intrusion Process Detecting intrusion in distributed network from outside network segment as well as from inside is a difficult problem [20]. In many cases, an intruder achieves a set of stages to perform its attack. In each stage he can use a different node in the network. This technique has, especially, two consequences : • Widening the range of the attack and controlling the major part of the network, • Making hard detecting the intrusion. 1) Mobile agent usefulness: It is advisable to define, firstly, an agent. We refer to [21] : • An agent is a physical or logical entity characterized by the following attributes : – Autonomy : agents are independently-running entities, they operate without the direct intervention of humans or others, – Mobility : agents are able of suspending processing on one platform and moving to another, where they resume execution of their code, – Rationality : agents embody the capacity to decompose and solve a problem in a rational manner, – Reactivity : agents perceive their environment and response in a timely fashion to changes that occur in it, – Inferential capability : agents are able to use prior knowledge of general goal in order to act on tasks, – Pro-activeness : agents can take the initiative to act and response to their environment, – Social ability : agents are able to meet and interact with other agents. The interaction and collaboration between agents is achieved by an agent communication language and may depend on an ontology to realize a common understanding of a situation. Accordingly to the above attributes, we will argue, in this section, the use of mobile agent to improve the characteristics of the IDS, overcome the limitations described previously and evaluate their applicability to design an automated intrusion detection : • Reducing Network Load :

The actual IDS are facing one of the most pressing problems which is the processing of a tremendous amount of data over the network. Abstracted forms of these data are usually sent from all locations in the network to a central site to be processed, causing the increase of network load. Mobile agents offer the opportunity to overcome this problem by eliminating the need to this data transfer. Instead, the processing program (agent) will go to the data, given that the an agent is smaller in size than the network information. Furthermore, when an agent collects data related to the host on which it is running, we avoid the risk to be subject to the insertion and evasion attacks. Overcoming Network Latency : Mobile agents are able to dispatch from a host to carry out operations directly to the remote point of interest, thus agents can provide an appropriate respond faster than a hierarchical IDS that has to communicate with a central coordinator based elsewhere on the network. Asynchronous Execution and Autonomy : Agents can be stopped and started without disturbing the rest of the IDS. Notice that the mobile agents are able to continue to operate autonomously even if the host platform where it was created is not available or disconnected from the network. Mobile agent frameworks provide IDS the possibility to continue to work even if the failure of a central controller or a communication link was occurred; this fact allow mobile agents to provide Fault Tolerance characteristics. Dynamic Adaption : Mobile agents can be retracted, cloned, dispatched, killed or put to sleep as network’s configuration, topology and traffic characteristics change over time. As the number of the node in the network increases, agents can be cloned and dispatched to these new computing elements. Robust Behavior : Mobile agents have the ability to react dynamically to insecurity conditions making easier to build robust distributed systems. Even if one of the agents fails, the other agents in the IDS can take up the tasks of the failed agent and continue the detection. Scalability : Distributed mobile agents IDS are one of several options that allow computational load and diagnostic tasks to be distributed throughout the network [3]. This improves scalability and holds up fault resistance behavior.

B. Related Work The idea of distributing the intrusion detection system using a software agents is not entirely new. However, most of the related works emphasized static agents instead of mobiles ones. Applying mobile agent technology to IDS gives a result to only few research projects. In 1999, a project at The Information-Technology Promotion Agency (IPA) in Japan involves an Intrusion Detection Agent (IDA) System [22]. IDA is a classic host-based system which relies on mobile agents

Fig. 1.

MAFIDS Architecture

mainly to trace intruders among the various hosts involved in an intrusion. In the same year, Micael [23] pursues a more ambitious aim where the entire system functionally with mobile agents. Nevertheless, only the architecture description has been presented and no details have followed so far. In 2000, an IDS framework based on mobile agents has been described in [24]. Unfortunately, the detection is dealt with superficially. Globally, there have been some previous attempts to take advantage of agents in the field of intrusion detection, as for example [25], [26], [27]. It is worth mentioning the mobile-agents approach [28], [9]. Besides, there are other products such as Tritheme which is an IDS under LPG licence allowing the simultaneous use of HIDS and NIDS approaches distributing the different functions under agents scattered on the network under control [29]. In 2002, Trapathi and al. describes an IDS which are designed as mobile application that roam the network to detect attacks and track intruders [30]. The Skyrecon’s StormShield [31] is a product complementary to firewall based on the behavior approach. StormShield treats in a coordinated way the potentially vulnerable aspects of a host: traffic network, operating system, applications. MonALISA is a distributed and dynamic system able to provide a complete control and an overall monitoring of a complex system [32]. The architecture of MonALISA is based on autonomous entities capable of collecting, analyzing and processing data in distributed network. C. Our System: Architecture Overview The distributed structure of our MAFIDS (Mobile Agents For Intrusion Detection System) consists of four levels, as shown in figure 1: the down level, the pretreatment, the kernel and the upper level. We have four cooperatives, communicants and collaborative entities which are able to move from one station to another: Sniffer agent, Filter agent, Analyzer agent and Decision agent. Every category of agent is assigned respectively to the levels cited previously. 1) The Sniffer agent: This kind of agent will be cloned and distributed throughout the network. This agent patrols the

network, collects all the events occurred in the host to which it is related and storage the collected data in a sniffing file. The Sniffer agent can duplicate it self in order to lighten the network charge. On the down level, we are interested to collect all the events occurred through the network in real time. Sniffer are what is commonly called sensor [33]. 2) The Filter Agent: Detecting intrusions in a distributed system turns out to be difficult. IDS must undertake to analyze a huge volumes of events. This task becomes more difficult especially when the events must be collected from distributed sources around the network. Intrusions seep in all levels of the distributed system; each level may require monitoring. So, to be able to determine whether an intrusion is taking place, we have to aggregate and merge events collected from various sources, which is among the set of tasks allocate to the Filter agent. This agent performs its tasks in the context of the collectedevents pretreatment phase, which precedes the analysis phase. The Filter agent plays the twofold role of preparing data to be analyzed, and of establishing a baseline of normal network behavior during the training period. In its first role, the Filter agent access to the sniffing file which is modified by the Sniffer agent and treats these crude events by achieving the following tasks : • Distinguish the various fields of the events collected in crude such as destination address and the protocol, • Sort the events by the category of packet (TCP, IP,...) concerned by a specific kind of intrusion. Of equal important to its first role, is the Filter’s responsibility to establish a traffic baseline under normal (non-flood) network operating conditions. Normal operating conditions are defined as average traffic and application flow crossing the network edge devices averaged over time while the network is not under attack. The basic idea is to compute statistical values of relevant features which will identify SYN Flood attack (e.g. protocol distribution). The training period lasting eight week during which the Filter agent measures TCP packet count for every hour interval of six-day work week. Mean values and adaptive thresholds are calculated and stored in a local data structure for every interval (Data base of normal profiles). 3) The Analyzer Agent: This kind of agent processes and analyzes the events captured by the Sniffer agent and preprocessed by the Filter agents. While the Filter agent performs its major tasks in the training period, the Analyzer agent operates in the detection period. It constructs current traffic profiles. At each given period the Analyzer agent calculates and stores the deviation between the ”normal” and current value (number of SYN packets). It sends an alert if its alarm condition is verified. We will detail this alarm condition in the next section. 4) The Decision Agent: The administrator, depending on his need and requirement, can give some parameters relative to the full detection process. This parameters are saved on a configuration file which is consulted by the Decision agent in order to sort them by kind of treatment. In fact, we consider sniffing parameters such as the address of the monitoring hosts

and filter parameters like the target protocol. Furthermore, the Analyzer agent report their findings to the Decision agent which transmits them to the administrator. D. Proposed Metrics We propose new metrics issued from agent synergy and an event correlation engine. We also take into account new features in the detection process in order to improve its ”precision”, i.e. its ability to correctly detect intrusion in a short time. 1) Event correlation engine: Our goal is to enrich the pretreatment phase by adding new module checking for suspicious event. For us, a suspicious event is any event liable to be part of an attack signature. Due to the widespread prevalence of Snort, its signatures comprise the most comprehensive signature set that is openly available. Consequently, Snort which is one of the most popular open source security tools [34], serves us as a reference. We parse the SNORT signatures database for DOS attacks. We pick out the most common attributes in signatures which are source port fields (SPF), destination port fields (DPF) and packet data payload (PDP). We construct correlation rules TABLE I C OMMON ATTRIBUTES VALUES IN TCP PACKETS

Source Port Destination Port

Packet Data Payload

TCP 20432, 12754, 15104 27665, 12754, 7070, 8080, 135, 139, 3372, 6004, 6789, 6790, 80, 179, 515, 646, 21513, 3128, 9191, 443, 3101, 25 FF F4 FF FD 06, FF FF FF FF FF FF, 00 03 00 00 00, 05 00 00 03 10 00 00 00, 00 00 00 00, 01 06 00 00 00, FF FF FF, 00 00, 3A, 13, 0A, 00

(such as the example below) composed from all possible combinations of the values of the picked attributes. There is an additional field in the TCP packet that is the result of the module checking : Priority. Priority has a binary value. The Filter agent affects the value 1 if it verifies at least one of the correlation rules, 0 otherwise. IF SPF = 12754 and DPF = 139 and PDP = FF FF FF FF FF FF THEN Priority = 1 2) Agents synergy: Our aim is to reach a global state vision of our agent system by favoring agents synergy in order to emphasize the result of anomaly detection by monitoring the agents own progress and the whole system. The underlying idea is that intrusion affects both system and agent behavior especially in the case of DOS attack. We advocate the fact that to detect failures, an agent must have information about the whole agent system behavior. Given that every agent in our MAFIDS has, in his knowledge database, a set of metrics that indicate the ideal state of the

system (e.g. maximum number of cloned agents, Average of agent response time), it compares these metrics to the agents actual behavior to detect discrepancies indicating possible failure. We define a set of messages and metrics that illustrate the agents synergy and describe their state. The Filter agent can send the following urgent messages to the Analyzer agent: • Filter syntactic abnormal event: when the Filter agent can not identify the different fields of packet (such as IP address and port). The exact number and nature of the fields is dependent on the type of the event. • Filter semantic abnormal event: when the Filter agent find abnormalities in the packet field value such as unusual long or short field lengths, which can indicate an attacker is attempting to introduce a buffer overflow, • Filter suspicious event: when the Filter agent put the value 1 to the priority field of the event, • Filter count abnormal X event: when the Filter agent find an unusual number of occurrences of particular event, • Filter pb access resources : when the filter agent can not access to the sniffing file. When receiving one of these urgent messages, the Analyzer agent increments its counter of urgent notifications (CUN). We also define the following metrics which will be considered by the Analyzer agent in its anomaly detection algorithm: • Latency Time of Response (LTR): Periodically, the Analyzer agent send messages to call others agents. Given the total number of running agents, the Analyzer agent can deduce the number of agents which do not respond. This metric can indicate a critical overload of an agent or an unexpected agent crash which could be symptom of DOS attack. The Analyzer agent measures the total latency time of response which will be multiplied by the number of agent with no response given LTR as a result. During its detection process the Analyzer agent will compare this metric with the average latency time stored during the training period. • Number of Cloned Agent (NCA): Given the normal traffic flow, Decision agent knows the maximum number of cloned agent. During the training period we store normal traffic flow which is the number of packets of a given protocol travelling between a source and a destination IP/port pair within a certain period of time. The Sniffer and the Filter agents are cloned depending on the size of the sniffing file in order to lighten the network charge. If the actual number of cloned agent (NCA) exceeds the maximum number of cloned agent then the Decision agent sends an urgent message to notify the Analyzer agent. We construct the alarm condition taking into account the defined metrics as following: If ((LT Ri > LT Rµn−1 ) or (N CAi > N CAµn−1 ) or (CU N > 0))) then ALARM at time n,

Our goal is to speed up the detection process and in the same time reduce the false positive rate. We evaluate the performance of our MAFIDS by comparing it to SNORT. IV. I MPLEMENTATION AND PERFORMANCE EVALUATION We implement MAFIDS using Sun’s Java Development Kit version 1.4.1 (Sun Microsystems, 2003), the framework Aglets Workbench 2.0.2., the Netbeans 3.4. and the Jpcap 0.01.16. All the experiments were conducted on equivalent machines equipped with a Pentium Dual Core Processor running at 1.66GHz and 1.99 GB of main memory. Our system performs their tasks over any number of hosts in the network. Each host can receive any number of Sniffer agent that monitor all events occurring in it. In a first phase, we test the communication model by sending a set of messages between our four agents classes. We also test the mobility of these agents by dispatching them and retracting over three hosts. In a second phase we run MAFIDS in order to learn the normal packet attribute values during the attack-free period (8 weeks) of inside training data which consist of 18,983,528 traffic packets in order to come up with the normal traffic profile based on distinct packet field values for each of the host in the network. These profiles then are classified by time of day, day of week. We consider only working day (from 8:00 AM to 6:00 PM). In a third phase we run MAFIDS and SNORT (version 1.9.0), separately, in the same condition. We randomly inject Syn flood attack by using the HPING tool [35] which is able to send custom TCP/IP packets to network hosts. All experiments run on three machines: • Attack host, • Web client (IP address which we usurped), • Web server (the victim machine). We usurp the IP address of the web client host and send a large number of SYN packets to the web server via this command : hping -S -i u10 -p 80 -a At the same time we disconnected the web client host. Thus we prevent the machine from answering the packets sent by the web server. Otherwise, it would send TCP RST packets which would stop the connection attempt. The web server machine waits for confirmation that never arrives. Hence the attack succeeds (figure 2). We evaluate the two systems performance with detection delay (DD) detection false positive rate (FPR) and detection rate (DR). Performance is shown by plotting receiver operating characteristic curves (ROC) which show the detection rate versus the false alarms rate produced by each system (Figure 3). MAFIDS demonstrates better performance in reducing false alarm rate and increasing detection rate. The average of false alarm rate is about 6.25% with 82% detection rate. MAFIDS

Fig. 2.

Fig. 3.

Fig. 4.

Result of the SYN flood attack

ROC curves for MAFIDS and SNORT

MAFIDS vs SNORT in terms of detection delay

exhibits improvements of 28% and 2.2%, respectively for false alarm rate and detection rate compared with the results of SNORT (The average of false alarm rate is about 8% with 80.25% detection rate). Such superior performance of MAFIDS may be explained by the fact that we strengthen the alarm condition by more criteria (LTR, NCA) to generate the alarm and in the same time we consider more effects which can indicate DOS attack (CUN). As can be seen from the figure 4 MAFIDS has the best detection delay performance. We generate a set of packets varied from 1000 to 8000. For each set we simulate the syn flood attack and we calculate the detection delay. MAFIDS is

much faster than SNORT. SNORT spends more than 30% of total processing in string-matching. For example, in the case of 6500 packets, we observe that detection delay is reduced by 49% (43 second vs 21 second). This can be explained by the fact that The Filter agent simplifies and facilitates tasks of the Analyzer agent especially when it includes the priority field. Besides, Agents exchange exactly what they need as urgent messages, no more and no less, given that sending too much messages between agents leads to network overload. V. C ONCLUSION Intrusion detection systems must handle masses of information (in real-time) so as to report the abnormal use of networks and computer systems. We are interesting in anomaly detection methods which allow us to detect new types of attacks. But their major drawbacks are: A longer detection and higher false alarm rate. Mobile agent could offer a valuable addition to the intrusion detection field. We designed and developed MAFIDS (Mobile Agents for Intrusion Detection System) based on anomaly approach. Being convinced that anomaly detection is not always about detecting unexpected activities but also about detecting state changes, we defined new metrics issued from agent synergy and a proposed event correlation engine. Experimental results demonstrate that MAFIDS presents better performance in reducing false alarm rate and detection delay by comparing it to SNORT. For the future work, more research can be done testing MAFIDS against more attacks and exploring how mobility and self-clone ability would enhance the survivability of IDS. R EFERENCES [1] J. P. Anderson, Computer security threat monitoring and surveillance, James P. Anderson Company, Fort Washington, Pennsylvania, 1980. [2] D. E. Denning, An intrusion detection model, IEEE Transactions on software engeneering, SE-13:222232, 1987. [3] M. J. Ranum, Experiences Benchmarking Intrusion Detection Systems, NFR Security, 2001. [4] R. Ando and Y. Kadobayashi and Y. Shinoda, Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module, ICISC 2007, The 10th International Conference on Information Security and Cryptology, 2007. [5] SNORT, http://www.snort.org/, 2007. [6] S. Specht and R. Lee, Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures, Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, 2004. [7] W. Li, Using Genetic Algorithm for network intrusion detection, United States Department of Energy Cyber Security Group, Training Conference, 2004. [8] L. Vokorokos and A. Balaz and M. Chovanec, Intrusion Detection System using self organizing map, Acta Electrotechnica et Informatica No. 1, Vol. 6, 2006. [9] K. Deeter and K. Singh and S. Wilson and L. Filipozzi and S. Vuong, APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System, Mobility Aware Technologies and Applications. LNCS, vol. 3284, Springer, Heidelberg, pp. 244-253, 2004. [10] K. Ghedira, MASC : une approche Multi-Agents de probl´emes de Statisfaction de Contraintes, Toulouse, Higher National School of Aeronautics and Space (ENSAE), 1993. [11] V. Honavar and L. Miller and J. S. K. Wong, Distributed knowledge networks, IEEE Information Technology Conference, Syracuse, pp. 8790, 1998. [12] D. B. Lange and M. Oshima, Seven Good Reasons for Mobile Agents, Communications of the ACM, 42(3):88, 1999.

[13] S. Kumar and E. Spafford, A Software Architecture to Support Misuse Intrusion Detection, Department of Computer Sciences, Purdue University, 1995. [14] G. Vigna and S. Eckmann and R. Kemmerer, Attack Languages, IEEE Information Survivability Workshop, IEEE Computer Society Press, pp. 163-166, 2000. [15] CISCO, http://www.cisco.com, 2008. [16] RealSecure, http://www.iss.net, 2008. [17] F. Gong, Deciphering Detection Techniques: Part II Anomaly-Based Intrusion Detection, White Paper, McAfee Network Security Technologies Group, 2003. [18] V. Kumar and J. Srivastava and A. Lazarevic, Managing Cyber Threats: Issues, Approaches and Challenges, Springer, ISSN 0924-6703, 2005. [19] K. Das, Protocol Anomaly Detection for Network-based Intrusion Detection, SANS Institute, 2002. [20] G. Hulmer and J. S. K. Wong and V. Honavar and L. Miller and Y. Wang, Lightweight Agents for Intrusion Detection, Journal of Systems and Software 67 (03), pp. 109-122, 2003. [21] Palmquis, Intelligent Agents in Computer and Network Management, http://www.gslis.utexas.edu/ palmquis/courses, 1998. [22] M. Asaka and S. Okasawa and A. Taguchi and S. Goto, A Method of Tracing Intruders by Use of Mobile Agents, the 9th Annual Internetworking Conference (INET‘99), 1999. [23] J. D. De Queiroz and L. F. R. Da Costa Carmo and L. Pirmez, Micael: An Autonomous mobile agent system to protect new generation networked application, the 2nd Annual Workshop on Recent Advances in Intrsuion Detection, 1999. [24] M. C. Bernardes and E. D. S. Moreira, Implementation of an Intrusion Detection System based on Mobile Agents, International Symposium on Software Engineering for Parallel and Distributed Systems, pp. 158-164, 2000. [25] E. H. Spafford and D. Zamboni, Intrusion Detection Using Autonomous Agents, Computer Networks: The Int. Journal of Computer and Telecommunications Networking 34(4), pp. 547-570, 2000. [26] I. M. Hegazy and T. Al-Arif and Z. T. Fayed and H. M. Faheem, A Multi-agent Based System for Intrusion Detection, IEEE Potentials 22(4), pp. 28-31, 2003. [27] D. Dasgupta and F. Gonzalez and K. Yallapu and J. Gomez and R. Yarramsettii, CIDS: An agentbased intrusion detection system, Computers & Security 24(5), pp. 387-398, 2005. [28] H. Q. Wang and Z. Q. Wang and Q. Zhao and G. F. Wang and R. J. Zheng and D. X. Liu, Mobile Agents for Network Intrusion Resistance, APWeb 2006. LNCS, vol. 3842, Springer, Heidelberg, pp. 965-970, 2006. [29] Tritheme, Tritheme Distributed and Hybrid Intrusion Detection and Response System, http: http://sourceforge.net/projects/tritheme/, 2007. [30] A. Trapathi and T. Ahmed and S. Pathak and A. Pathak and M. Carney and M. Koka and P. Dokas, Active Monotiring of Network System using Mobile Agents, Networks 2002, a joint conference of ICWLHN 2002 and ICN 2002, 269-280, 2002. [31] N. Daira, Strorshield presentation, http: http://www.skyrecon.com/, 2004. [32] MonALISA, MONitoring Agents using a Large Integrated Services Architecture, http://monalisa.cacr.caltech.edu/, 2005. [33] A. Cardon, A distributed multiagent system for the self-evaluation of dialogs, the Joint JSAI 2001 Workshop on New Frontiers in Artificial Intelligence, Springer-Verlag, 43-50, 2001. [34] J. Timofte, Intrusion Detection using Open Source Tools, Informatica Economica Journal Issn: 14531305, 75-79, 2008. [35] HPING, http://www.hping.org, 2007.

Distributed agent architecture for intrusion detection ...

Host Based IDS (HIDS): perform their analysis on in- formation collected at a single host by the audit trails. HIDS are designed for monitoring a single computer.

270KB Sizes 2 Downloads 214 Views

Recommend Documents

Intelligent Mobile Agent for Intrusion Detection System - CiteSeerX
Therefore, JAVA language will be chosen for its .... the same time, a language and a knowledge base, also called .... php?action view=submenu&option=tree&id.

Intelligent Mobile Agent for Intrusion Detection System - CiteSeerX
a finished intelligent tool prototype for intrusion detection. Intrusion ..... They receive alerts from correlator agents, analyse ... Monitoring and Surveillance.

Intrusion Detection: Detecting Masquerade Attacks Using UNIX ...
While the majority of present intrusion detection system approaches can handle ..... In International Conference on Dependable Systems and Networks (DSN-. 02), 2002 ... Sundaram, A. An Introduction to Intrusion Detection [online]. URL:.

Efficient Data Mining Algorithms for Intrusion Detection
detection is a data analysis process and can be studied as a problem of classifying data ..... new attacks embedded in a large amount of normal background traffic. ...... Staniford et al propose an advanced method of information decay that is a.

Intrusion Behavior Detection Through Visualization
0-7803-7952-7/03/$17.00 _ 2003 IEEE. Intrusion Behavior Detection Through Visualization. Robert F. Erbacher. Department of Computer Science, LI 67A. University at Albany-SUNY. 1400 Washington Avenue. Albany, NY 12222, USA [email protected] Abst

We must be able to monitor all of these systems simul- ... on the screen and to differentiate remote nodes as we ..... International Conference On Visualization,.

attractors, as they are discerned pre-attentively [1], this leads to a very effective monitoring environment. Given our goal is to provide an additional tool to system.

attractors, as they are discerned pre-attentively [1], this leads to a very effective monitoring environment. Given our goal is to provide an additional tool to system.

Feature Selection for Intrusion Detection System using ...
Key words: Security, Intrusion Detection System (IDS), Data mining, Euclidean distance, Machine Learning, Support ... As the growing research on data mining techniques has increased, feature selection has been used as an ..... [4] L. Han, "Using a Dy

A distributed system architecture for a distributed ...
Advances in communications technology, development of powerful desktop workstations, and increased user demands for sophisticated applications are rapidly changing computing from a traditional centralized model to a distributed one. The tools and ser

"An agent architecture for prognostic normative reasoning"
that regulate how interaction and collaboration with. Non-Governmental Organizations (NGOs) must take .... planners [6] whereas the other approach uses decision- theoretic planners [7]. Following the plan recogni- ... In this respect, our approach is

A Distributed Multi-Agent System for Collaborative ...
Mail Stop 269-2 ... aided by easy sharing utilities as well as automated information .... between agents is supported with automatic indexing methods in.

Intrusion Detection Systems: A Survey and Taxonomy - CiteSeerX
Mar 14, 2000 - the Internet, to attack the system through a network. This is by no means ... latter approach include its reliance on a well defined security policy, which may be absent, and ..... and compare the observed behaviour accordingly.