Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

An Enhanced Multi-Agent based Network Intrusion Detection System using Shadow Log

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 100 - Number 9
Year of Publication: 2014
Authors:
Namita Singh
Siddharth Krishan
Uday Kumar Singh
10.5120/17550-8146

Namita Singh, Siddharth Krishan and Uday Kumar Singh. Article: An Enhanced Multi-Agent based Network Intrusion Detection System using Shadow Log. International Journal of Computer Applications 100(9):1-5, August 2014. Full text available. BibTeX

@article{key:article,
	author = {Namita Singh and Siddharth Krishan and Uday Kumar Singh},
	title = {Article: An Enhanced Multi-Agent based Network Intrusion Detection System using Shadow Log},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {100},
	number = {9},
	pages = {1-5},
	month = {August},
	note = {Full text available}
}

Abstract

The capability of agent and its distributed problem solving nature makes it useful and powerful; such that it can be utilized in various fields. Various research [1][2][3][4][5][6] has been done and currently in progress based on the utilization of the capability of the agents. Here our focus is on utilization of agent capability for identifying intrusion in network. Some agent based model and framework has been also produced for network intrusion detection system (NIDS)[5][6]. This paper includes a study on theory research an enhanced model based on shadow log.

References

  • Wooldridge, M. An introduction to Multi agent system. Wiley Ed. (2002).
  • Jeffrey M. Bradshaw, ?An Introduction to Software Agents, In Jeffrey M. Bradshaw, editor, Software Agents, chapter 1. AAAI Press/The MIT Press, 1997.
  • Jones Anita K, Sielken Robert S. : Computer System Intrusion Detection: A Survey. University of Virginia, USA 19–20.
  • Andreas Fuchsberger, ?Intrusion Detection Systems and Intrusion Prevention Systems?; Information Security Group, Royal Holloway, University of London, Egham, Surrey TW200EX, United Kingdom 2005.
  • Chandrabhan Singh, Sanjay Sachan and Mohit Gangwar. Article: MAS based Selection and Composition Process of SWS's for Medical Health Care Planning System. International Journal of Computer Applications 60(16):40-44, December 2012. Published by Foundation of Computer Science, New York, USA.
  • Munish Gupta, Manish Saxena, Vijay Kumar Mishra, Chandrabhan Singh "MAS BASED FRAMEWORK FOR NETWORK INTRUSION DETECTION SYSTEM", International Journal of Computer science & Communication Network (IJCSCN), volume 2 (6), 677-680, ISSN: 2249-5789.
  • Alankar Srivastava, Shruti Saxena and Chandrabhan Singh. Article: Ontological Description and MAS based Composition Process of SWS's for Recruitment Domain. International Journal of Computer Applications 64(19):42-47, February 2013. Published by Foundation of Computer Science, New York, USA.
  • Helmer, G. , Wong, J. S. K. , Honavar, V. G. , Miller, L. : Automated Discovery of Concise Predictive Rules for Intrusion Detection. Journal of Systems and Software 60(3), 165–175 (2002).
  • Reilly, M. , Stillman, M. : Open Infrastructure for Scalable Intrusion Detection. In: IEEE Information Technology Conference, pp. 129–133 (1998).
  • Spafford, E. H. , Zamboni, D. : Intrusion Detection Using Autonomous Agents. Computer Networks: The International Journal of Computer and Telecommunications Networking 34(4), 547–570 (2000).
  • Stolfo, S. , Prodromidis, A. L. , Tselepis, S. , Lee, W. , Fan, D. W. , Chan, P. K. : JAM: Java Agents for Meta-Learning over Distributed Databases. In: Third International Conference on Knowledge Discovery and Data Mining, pp. 74–81 (1997).
  • Walsh, W. E. , Wellman, M. P. : A market protocol for distributed task allocation. In: In Third International Conference on Multiagent Systems, Paris (1998).
  • M. Bernardes, E. Moreira. Implementation of an Intrusion Detection System Based on Mobile Agents. Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 2000.