MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agents

  title={MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agents},
  author={Chunsheng Li and Qingfeng Song and Chengqi Zhang},
Distributed intrusion detection systems (IDS) have many advantages such as scalability, subversion resistance, and graceful service degradation. However, there are some impediments when they are implemented. The mobile agent (MA) technology is of many features to suit the implementation of distributed IDS. In this paper, we propose a novel architecture _•• MA·IDS with MA technology for distributed IDS. MA-IDS employsMA technology to coordinately process information from each monitored host, and… CONTINUE READING
Highly Cited
This paper has 46 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 32 extracted citations

A mobile agent-based P2P model for autonomous security hole discovery

The Fifth International Conference on Computer and Information Technology (CIT'05) • 2005
View 5 Excerpts
Highly Influenced

A Novel Peer-to-Peer Intrusion Detection System

Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05) • 2005
View 4 Excerpts
Highly Influenced

Locality-based profile analysis for secondary intrusion detection

8th International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN'05) • 2005
View 10 Excerpts
Highly Influenced

Weighted link graphs: a distributed IDS for secondary intrusion detection and defense

Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security • 2005
View 10 Excerpts
Highly Influenced

Improving Performance of Mobile Agent Based Intrusion Detection System

2015 Fifth International Conference on Advanced Computing & Communication Technologies • 2015
View 2 Excerpts

Context-aware multi-agent based framework for securing Android

2014 International Conference on Multimedia Computing and Systems (ICMCS) • 2014
View 1 Excerpt

Towards a new intelligent generation of intrusion detection system

Proceedings of the 4th Edition of National Security Days (JNS4) • 2014
View 2 Excerpts

Similar Papers

Loading similar papers…