Survey on a Co-operative Multi-agent Based Wireless Intrusion Detection Systems Using MIBs

Author(s):  
Ashvini Vyavhare ◽  
Varsharani Bhosale ◽  
Mrunal Sawant ◽  
Fazila Girkar
Author(s):  
Falkner Moraes ◽  
Zair Abdelouahab ◽  
Denivaldo Lopes ◽  
Emerson Oliveira ◽  
Cenidalva Teixeira ◽  
...  

10.28945/3372 ◽  
2009 ◽  
Author(s):  
Adebukola Onashoga ◽  
Adebayo Akinde ◽  
Adesina Sodiya

Intrusion Detection Systems (IDS) is defined as a component that analyses system and user operations in computer and network systems in search of activities considered undesirable from security perspectives. Applying mobile agent (MA) to intrusion detection design is a recent development and it is aimed at effective intrusion detection in distributed environment. From the literature, it is clear that most MA-based IDS that are available are not quite effective because their time to detection is high and detect limited intrusions.This paper proposes a way of classifying a typical IDS and then strategically reviews the existing mobile agent-based IDSs focusing on each of the categories of the classification, for example architecture, mode of data collection, the techniques for analysis, and the security of these intelligent codes. Their strengths and problems are stated wherever applicable. Furthermore, suggested ways of improving on current MA-IDS designs are presented in order to achieve an efficient mobile agent-based IDS for future security of distributed network.


2021 ◽  
Vol 11 (2) ◽  
pp. 111-142
Author(s):  
Nassima Bougueroua ◽  
Smaine Mazouzi ◽  
Mohamed Belaoued ◽  
Noureddine Seddari ◽  
Abdelouahid Derhab ◽  
...  

Abstract Multi-Agent Systems (MAS) have been widely used in many areas like modeling and simulation of complex phenomena, and distributed problem solving. Likewise, MAS have been used in cyber-security, to build more efficient Intrusion Detection Systems (IDS), namely Collaborative Intrusion Detection Systems (CIDS). This work presents a taxonomy for classifying the methods used to design intrusion detection systems, and how such methods were used alongside with MAS in order to build IDS that are deployed in distributed environments, resulting in the emergence of CIDS. The proposed taxonomy, consists of three parts: 1) general architecture of CIDS, 2) the used agent technology, and 3) decision techniques, in which used technologies are presented. The proposed taxonomy reviews and classifies the most relevant works in this topic and highlights open research issues in view of recent and emerging threats. Thus, this work provides a good insight regarding past, current, and future solutions for CIDS, and helps both researchers and professionals design more effective solutions.


Sign in / Sign up

Export Citation Format

Share Document