N. Asokan, A. Sujitha, R. Poornima, P. Sujatha, A. Kannan
{"title":"基于移动代理的可信分布式协同入侵检测","authors":"N. Asokan, A. Sujitha, R. Poornima, P. Sujatha, A. Kannan","doi":"10.1109/ICRTIT.2013.6844188","DOIUrl":null,"url":null,"abstract":"A distributed environment is one in which intrusions are prevalent and drastically affect the performance of the networks. Therefore a need for Intrusion Detection Networks arises. Collaborators could be used here to enhance the detection of attacks. But still this concept suffers from lack of trustworthiness in the distributed environment. We introduce Mobile Agents (MA) to handle this problem effectively. A DCE - TRUST architecture is proposed where MAs are used to migrate from one node to another autonomously within the range of collaborators in and out of each network to inform them about the detected intrusions accurately and in a timely manner. We also found that the proposed architecture enhances detection rate and minimizes the rate in which each node gets to know about the attacks.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Trustworthy distributed collaborative intrusion detection using mobile agents\",\"authors\":\"N. Asokan, A. Sujitha, R. Poornima, P. Sujatha, A. Kannan\",\"doi\":\"10.1109/ICRTIT.2013.6844188\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A distributed environment is one in which intrusions are prevalent and drastically affect the performance of the networks. Therefore a need for Intrusion Detection Networks arises. Collaborators could be used here to enhance the detection of attacks. But still this concept suffers from lack of trustworthiness in the distributed environment. We introduce Mobile Agents (MA) to handle this problem effectively. A DCE - TRUST architecture is proposed where MAs are used to migrate from one node to another autonomously within the range of collaborators in and out of each network to inform them about the detected intrusions accurately and in a timely manner. We also found that the proposed architecture enhances detection rate and minimizes the rate in which each node gets to know about the attacks.\",\"PeriodicalId\":113531,\"journal\":{\"name\":\"2013 International Conference on Recent Trends in Information Technology (ICRTIT)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Recent Trends in Information Technology (ICRTIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRTIT.2013.6844188\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRTIT.2013.6844188","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Trustworthy distributed collaborative intrusion detection using mobile agents
A distributed environment is one in which intrusions are prevalent and drastically affect the performance of the networks. Therefore a need for Intrusion Detection Networks arises. Collaborators could be used here to enhance the detection of attacks. But still this concept suffers from lack of trustworthiness in the distributed environment. We introduce Mobile Agents (MA) to handle this problem effectively. A DCE - TRUST architecture is proposed where MAs are used to migrate from one node to another autonomously within the range of collaborators in and out of each network to inform them about the detected intrusions accurately and in a timely manner. We also found that the proposed architecture enhances detection rate and minimizes the rate in which each node gets to know about the attacks.