Abstract
Intrusion detection system based on mobile agent has overcome the speed-bottleneck problem and reduced network load. Because of the low detection speed and high false positive rate of traditional intrusion detection systems, we have proposed an immune agent by combining immune system with mobile agent. In the distributed intrusion detection systems, the data is collected mostly using distributed component to collect data sent for processing center. Data is often analyzed in the processing center. However, this model has the following problems: bad real time capability, bottleneck, and single point of failure. In order to overcome these shortcomings, a new distributed intrusion detection method based on mobile agent is proposed in this paper by using the intelligent and mobile characteristics of the agent. Analysis shows that the network load can be reduced and the real time capability of the system can be improved with the new method. The system is also robust and fault-tolerant. Since mobile agent only can improve the structure of system, dynamic colonial selection algorithm is adopted for reducing false positive rate. The simulation results on KDD99 data set have shown that the new method can achieve low false positive rate and high detection rate.
This paper is supported by Research fund of University of Jiangsu Province and Jiangsu University of Science and Technology’s Basic Research Development Program (No. 2005DX006J).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Axelsson, V.: Intrusion detection systems: A survey and taxonomy. Technical Report No 99–15, Chalmers University of Technology, Sweden
Hunteman, V.: Automated information system–(AIS) alarm system. In: 20th NIST-NCSC National Information Systems Security Conference, pp. 394–405. IEEE Press, New York (1997)
Staniford Chen, S., Cheung, S., Crawford, R., et al.: Grids: a graph based intrusion detection system for large networks. In: 19th National Information System Security Conference. National Institute of Standards and Technology, vol. 1, pp. 361–370. IEEE Press, Los Alamitos (1996)
Porras, P.A., Neumann, P.G.: MERALD: event monitoring enabling responses to anomalous live disturbances. In: 20th National Information Systems Security Conference, National Institute of Standards and Technology, pp. 11–13. IEEE Press, Los Alamitos (1997)
Spafford, E.H.: Intrusion detection using autonomous agent. Computer Networks 3(4), 547–570 (2000)
Dasgupta, D., Brian, H.: Mobile security agent for network traffic analysis. In: DARPA Information Survivability Conference and Exposition II (DISCEX-II), Anaheium, CA, pp. 332–340. IEEE Press, Los Alamitos (2001)
Jansen, W., Mell, P., Karygiannis, T., Marks, D.: Mobile agents in intrusion detection and response. In: 12th Annual Canadian Information Technology Security Symposium, pp. 12–18. IEEE Press, Ottawa (2000)
Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. Journal of Computer Security 6, 151–180 (1998)
Kim, J., Bentley, P.: Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection. In: Congress on Evolutionary Computation, Honolulu, pp. 1015–1020 (2002)
Kim, J., Bentley, P., Aickelin, U., et al.: Immune system approaches to intrusion detection- a review. Natural Computting 6, 413–466 (2007)
Aickelin, U., Greensmith, J., Twycross, J.: Immune system approaches to intrusion detection–a review. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 316–329. Springer, Heidelberg (2004)
Glickman, M., Balthrop, J., Forrest, S.: A machine learning evaluation of an artificial immune system. Evolutionary Computation 13(2), 179–212 (2005)
Gomez, J., Gonzalez, F., Dasgupta, D.: An immune-fuzzy approach to anomaly detection. In: 12th IEEE International Conference on Fuzzy Systems (FUZZIEEE), vol. 2, pp. 1219–1224. IEEE Press, Los Alamitos (May 2003)
Carver, C., Hill, J., Surdu, J., Pooch, U.: A methodology for using intelligent agents to provide automated intrusion response. In: IEEE Systems, Man, and Cybemetics Information Assurance and Security Workshop, West Point, New York, pp. 110–116 (2000)
Zainal, A., Maarof, M.A., Shamdudd, S.M.: In.: Feature selection using rough set in intrusion detection. In: Proc. IEEE TENCON, p. 4 (2006)
Kim, B.j., Kim, I.k.: Kernel based intrusion detection system. In: Proc. IEEE ICIS, pp. 6 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, Y., Jing, C., Xu, J. (2010). A New Distributed Intrusion Detection Method Based on Immune Mobile Agent. In: Li, K., Fei, M., Jia, L., Irwin, G.W. (eds) Life System Modeling and Intelligent Computing. ICSEE LSMS 2010 2010. Lecture Notes in Computer Science, vol 6328. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15621-2_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-15621-2_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15620-5
Online ISBN: 978-3-642-15621-2
eBook Packages: Computer ScienceComputer Science (R0)