Abstract
A general or agent-based security system is usually constructed hierarchically and has a central manager acting as head of the whole system. However, the manager becomes a bottleneck for being connected by each client. It can even overload when too many clients request service simultaneously. The whole system may collapse when the central manager is attacked. And these systems are passive to detect and deal with the secure problem. Hereby we present a mobile agent-based P2P Autonomous Security Hole Discovery system (PASHD). It can detect infection and network intrusion based on knowledge of the local host. Viruses will be removed and connection will be refused after identification. In case of a suspicious activity, PASHD initiates a voting approach to make a collective decision and take further action. This system acts self-learning when encountering intrusion or infection with new patterns. And it has the capability of autonomous discovery the security hole of hosts in network. The integration of peer-to-peer behavior with mobile agents reduces latency and load; however, flexibility, effectivity, security and cooperation of the system are enhanced.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. In: Proceedings of the 7 International World Wide Web Conference, Brisbane, Australia, vol. 3. ACM Press, New York (1997)
Moore, D., Shannon, C.: The spread of the code-red worm (CRv2) (July 2001)
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the Slammer Worm. IEEE Security and Privacy 1(4), 33–39 (2003)
Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proc. of the 12th USENIX Security Symp., Washington, DC (August 2003)
Li, C., Song, Q., Zhang, C.: MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agents. In: Proc. of the 2nd International Conference on Information Technology for Application (ICITA 2004), pp. 451–455 (2004)
Balasubramaniyan, J., Carcia-Fernandez, J.O., Isacoff, D., Spafford, E.H., Zamboni, D.: An Architecture for Intrusion Detection using Autonomous Agents, Department of Computer Science, Purdue University: Coast TR, 98-05 (1998)
Hickman, B., Newman, D., Tadjudin, S., Martin, T.P.: Benchmarking Methodology for Firewall Performance. Internet Engineering Task Force, RFC 3511 (April 2003)
Ramachandran, G., Hart, D.: A P2P Intrusion Detection System based on Mobile agents. In: Proceedings of the 42nd annual Southeast regional conference citation 2004, Huntsville, Alabama, April 02 - 03 (2004)
Helmer, G., Wong, J., Honavar, V., Miller, L., Wang, Y.: Lightweight Agents for Intrusion Detection. Journal of Systems and Software, 109–122 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zheng, J., Wang, X., Xue, X., Toh, C.K. (2005). A Mobile Agent-Based P2P Autonomous Security Hole Discovery System. In: Wang, L., Chen, K., Ong, Y.S. (eds) Advances in Natural Computation. ICNC 2005. Lecture Notes in Computer Science, vol 3612. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11539902_64
Download citation
DOI: https://doi.org/10.1007/11539902_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28320-1
Online ISBN: 978-3-540-31863-7
eBook Packages: Computer ScienceComputer Science (R0)