Skip to main content

Mobile Agents for Network Intrusion Resistance

  • Conference paper
Advanced Web and Network Technologies, and Applications (APWeb 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3842))

Included in the following conference series:

Abstract

In this paper a distributed IDS systematic model based on mobile agents is proposed and the functions of key modules are described in detail. Then the key modules are implemented in mobile agent platform-IBM Aglets and the results of experiments are discussed and analyzed quantitatively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, C., Song, Q., Zhang, C.: MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agents. In: Proceedings of the 2nd ICITA, Harbin, China (January 2004)

    Google Scholar 

  2. Shangguan, X.: Distributed Intrusion Detection System Based on Mobile Agents. Dissertation for Masters̀ degree of Taiyuan University of Technology, 1–2 (2003)

    Google Scholar 

  3. Jansen, W.: Intrusion Detection with Mobile Agents [A]. Comput Commun. 25, 1392–1401 (2002)

    Article  Google Scholar 

  4. IBM: Aglets (2002), http://www.trl.ibm.com/aglets/

  5. Zhang, Y., Liu, J.: Mobile agent technology (M)., vol. 9, pp. 44–50, 148-152. Pekin Publishing company of TsingHua University (2003)

    Google Scholar 

  6. Sun, D.: Study and Implementation of Mobile Agents-Based Distributed Intrusion Detection Systerm. Dissertation for Masterś degree of XiDian University, 43–46 (2004)

    Google Scholar 

  7. Krügel, C., Toth, T.: Applying Mobile Agent Technology to Intrusion Detection. In: ICSE Workshop on Software Engineering and Mobility, Toronto (2001)

    Google Scholar 

  8. Spafford, E.H., Zamboni, D.: Intrusion Detection Using Autonomous Agents. Computer Networks 34, 547–570 (2000)

    Article  Google Scholar 

  9. Snapp, S.R., Brentano, J., Dias, G.V., et al.: A System for Distributed Intrusion Detection, pp. 234–236. IEEE, Los Alamitos (1999)

    Google Scholar 

  10. Mobile Computing (2004), http://latte.cs.iastate.edu/research/research.jsp

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, H.Q., Wang, Z.Q., Zhao, Q., Wang, G.F., Zheng, R.J., Liu, D.X. (2006). Mobile Agents for Network Intrusion Resistance. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds) Advanced Web and Network Technologies, and Applications. APWeb 2006. Lecture Notes in Computer Science, vol 3842. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11610496_134

Download citation

  • DOI: https://doi.org/10.1007/11610496_134

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-31158-4

  • Online ISBN: 978-3-540-32435-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics