Skip to main content

A Mobile Agent-Based P2P Autonomous Security Hole Discovery System

  • Conference paper
Advances in Natural Computation (ICNC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3612))

Included in the following conference series:

  • 1707 Accesses

Abstract

A general or agent-based security system is usually constructed hierarchically and has a central manager acting as head of the whole system. However, the manager becomes a bottleneck for being connected by each client. It can even overload when too many clients request service simultaneously. The whole system may collapse when the central manager is attacked. And these systems are passive to detect and deal with the secure problem. Hereby we present a mobile agent-based P2P Autonomous Security Hole Discovery system (PASHD). It can detect infection and network intrusion based on knowledge of the local host. Viruses will be removed and connection will be refused after identification. In case of a suspicious activity, PASHD initiates a voting approach to make a collective decision and take further action. This system acts self-learning when encountering intrusion or infection with new patterns. And it has the capability of autonomous discovery the security hole of hosts in network. The integration of peer-to-peer behavior with mobile agents reduces latency and load; however, flexibility, effectivity, security and cooperation of the system are enhanced.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. In: Proceedings of the 7 International World Wide Web Conference, Brisbane, Australia, vol. 3. ACM Press, New York (1997)

    Google Scholar 

  2. www.google.com/why_use.html

  3. Moore, D., Shannon, C.: The spread of the code-red worm (CRv2) (July 2001)

    Google Scholar 

  4. Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the Slammer Worm. IEEE Security and Privacy 1(4), 33–39 (2003)

    Article  Google Scholar 

  5. Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proc. of the 12th USENIX Security Symp., Washington, DC (August 2003)

    Google Scholar 

  6. http://www.trl.ibm.com/aglets/documentation_e.htm

  7. Li, C., Song, Q., Zhang, C.: MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agents. In: Proc. of the 2nd International Conference on Information Technology for Application (ICITA 2004), pp. 451–455 (2004)

    Google Scholar 

  8. http://www.ipa.go.jp/STC/IDA/paper/ida-client-install-e.pdf

  9. Balasubramaniyan, J., Carcia-Fernandez, J.O., Isacoff, D., Spafford, E.H., Zamboni, D.: An Architecture for Intrusion Detection using Autonomous Agents, Department of Computer Science, Purdue University: Coast TR, 98-05 (1998)

    Google Scholar 

  10. Hickman, B., Newman, D., Tadjudin, S., Martin, T.P.: Benchmarking Methodology for Firewall Performance. Internet Engineering Task Force, RFC 3511 (April 2003)

    Google Scholar 

  11. Ramachandran, G., Hart, D.: A P2P Intrusion Detection System based on Mobile agents. In: Proceedings of the 42nd annual Southeast regional conference citation 2004, Huntsville, Alabama, April 02 - 03 (2004)

    Google Scholar 

  12. Helmer, G., Wong, J., Honavar, V., Miller, L., Wang, Y.: Lightweight Agents for Intrusion Detection. Journal of Systems and Software, 109–122 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zheng, J., Wang, X., Xue, X., Toh, C.K. (2005). A Mobile Agent-Based P2P Autonomous Security Hole Discovery System. In: Wang, L., Chen, K., Ong, Y.S. (eds) Advances in Natural Computation. ICNC 2005. Lecture Notes in Computer Science, vol 3612. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11539902_64

Download citation

  • DOI: https://doi.org/10.1007/11539902_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28320-1

  • Online ISBN: 978-3-540-31863-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics