Skip to main content

A New Distributed Intrusion Detection Method Based on Immune Mobile Agent

  • Conference paper
Book cover Life System Modeling and Intelligent Computing (ICSEE 2010, LSMS 2010)

Abstract

Intrusion detection system based on mobile agent has overcome the speed-bottleneck problem and reduced network load. Because of the low detection speed and high false positive rate of traditional intrusion detection systems, we have proposed an immune agent by combining immune system with mobile agent. In the distributed intrusion detection systems, the data is collected mostly using distributed component to collect data sent for processing center. Data is often analyzed in the processing center. However, this model has the following problems: bad real time capability, bottleneck, and single point of failure. In order to overcome these shortcomings, a new distributed intrusion detection method based on mobile agent is proposed in this paper by using the intelligent and mobile characteristics of the agent. Analysis shows that the network load can be reduced and the real time capability of the system can be improved with the new method. The system is also robust and fault-tolerant. Since mobile agent only can improve the structure of system, dynamic colonial selection algorithm is adopted for reducing false positive rate. The simulation results on KDD99 data set have shown that the new method can achieve low false positive rate and high detection rate.

This paper is supported by Research fund of University of Jiangsu Province and Jiangsu University of Science and Technology’s Basic Research Development Program (No. 2005DX006J).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Axelsson, V.: Intrusion detection systems: A survey and taxonomy. Technical Report No 99–15, Chalmers University of Technology, Sweden

    Google Scholar 

  2. Hunteman, V.: Automated information system–(AIS) alarm system. In: 20th NIST-NCSC National Information Systems Security Conference, pp. 394–405. IEEE Press, New York (1997)

    Google Scholar 

  3. Staniford Chen, S., Cheung, S., Crawford, R., et al.: Grids: a graph based intrusion detection system for large networks. In: 19th National Information System Security Conference. National Institute of Standards and Technology, vol. 1, pp. 361–370. IEEE Press, Los Alamitos (1996)

    Google Scholar 

  4. Porras, P.A., Neumann, P.G.: MERALD: event monitoring enabling responses to anomalous live disturbances. In: 20th National Information Systems Security Conference, National Institute of Standards and Technology, pp. 11–13. IEEE Press, Los Alamitos (1997)

    Google Scholar 

  5. Spafford, E.H.: Intrusion detection using autonomous agent. Computer Networks 3(4), 547–570 (2000)

    Article  Google Scholar 

  6. Dasgupta, D., Brian, H.: Mobile security agent for network traffic analysis. In: DARPA Information Survivability Conference and Exposition II (DISCEX-II), Anaheium, CA, pp. 332–340. IEEE Press, Los Alamitos (2001)

    Chapter  Google Scholar 

  7. Jansen, W., Mell, P., Karygiannis, T., Marks, D.: Mobile agents in intrusion detection and response. In: 12th Annual Canadian Information Technology Security Symposium, pp. 12–18. IEEE Press, Ottawa (2000)

    Google Scholar 

  8. Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. Journal of Computer Security 6, 151–180 (1998)

    Google Scholar 

  9. Kim, J., Bentley, P.: Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection. In: Congress on Evolutionary Computation, Honolulu, pp. 1015–1020 (2002)

    Google Scholar 

  10. Kim, J., Bentley, P., Aickelin, U., et al.: Immune system approaches to intrusion detection- a review. Natural Computting 6, 413–466 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  11. Aickelin, U., Greensmith, J., Twycross, J.: Immune system approaches to intrusion detection–a review. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 316–329. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Glickman, M., Balthrop, J., Forrest, S.: A machine learning evaluation of an artificial immune system. Evolutionary Computation 13(2), 179–212 (2005)

    Article  Google Scholar 

  13. Gomez, J., Gonzalez, F., Dasgupta, D.: An immune-fuzzy approach to anomaly detection. In: 12th IEEE International Conference on Fuzzy Systems (FUZZIEEE), vol. 2, pp. 1219–1224. IEEE Press, Los Alamitos (May 2003)

    Google Scholar 

  14. Carver, C., Hill, J., Surdu, J., Pooch, U.: A methodology for using intelligent agents to provide automated intrusion response. In: IEEE Systems, Man, and Cybemetics Information Assurance and Security Workshop, West Point, New York, pp. 110–116 (2000)

    Google Scholar 

  15. Zainal, A., Maarof, M.A., Shamdudd, S.M.: In.: Feature selection using rough set in intrusion detection. In: Proc. IEEE TENCON, p. 4 (2006)

    Google Scholar 

  16. Kim, B.j., Kim, I.k.: Kernel based intrusion detection system. In: Proc. IEEE ICIS, pp. 6 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, Y., Jing, C., Xu, J. (2010). A New Distributed Intrusion Detection Method Based on Immune Mobile Agent. In: Li, K., Fei, M., Jia, L., Irwin, G.W. (eds) Life System Modeling and Intelligent Computing. ICSEE LSMS 2010 2010. Lecture Notes in Computer Science, vol 6328. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15621-2_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15621-2_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15620-5

  • Online ISBN: 978-3-642-15621-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics