• DocumentCode
    3218917
  • Title

    Mobile security agents for network traffic analysis

  • Author

    Dasgupta, Dipankar ; Brian, Hal

  • Author_Institution
    Div. of Comput. Sci., Memphis Univ., TN, USA
  • Volume
    2
  • fYear
    2001
  • fDate
    2001
  • Firstpage
    332
  • Abstract
    This paper describes the implementation of a distributed agent architecture for intrusion detection and response in networked computers. Unlike conventional intrusion detection systems (IDS), this security system attempts to emulate mechanisms of the natural immune system using Java-based mobile software agents. These security agents monitor multiple levels (packet process, system, and user) of networked computers to determine correlation among the observed anomalous patterns, reporting such abnormal behavior to the network administrator and/or possibly taking some action to counter a suspected security violation. The paper focuses on the design aspects of such an intrusion detection system by integrating different artificial intelligence techniques and a mobile agent architecture. Specifically, IBM´s Aglets (TM) Software Development Kit (ASDK) is used as the base agent architecture, along with adaptive resonance theory (ART-2) neural networks for network pattern classification, and a fuzzy logic controller for decision/action resolution. The feasibility and implementation of the mobile security agent system is demonstrated and some preliminary results are reported
  • Keywords
    ART neural nets; Java; computer networks; distributed programming; fuzzy control; multi-agent systems; programming environments; security of data; telecommunication traffic; ART-2 neural nets; Aglets; Java; Software Development Kit; abnormal behavior; adaptive resonance theory neural networks; artificial intelligence; distributed agent architecture; fuzzy logic controller; intrusion detection; mobile security agents; mobile software agents; multi-agent systems; natural immune system; network pattern classification; network traffic analysis; networked computers; security violation; Computer architecture; Computer networks; Computer security; Computerized monitoring; Distributed computing; Immune system; Intrusion detection; Java; Software agents; Telecommunication traffic;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    DARPA Information Survivability Conference & Exposition II, 2001. DISCEX '01. Proceedings
  • Conference_Location
    Anaheim, CA
  • Print_ISBN
    0-7695-1212-7
  • Type

    conf

  • DOI
    10.1109/DISCEX.2001.932184
  • Filename
    932184