Abstract
Distributed intrusion detection is considered as a robust technique for the detection of complicated attacks in high traffic flow and heterogeneous network environment. It has become one of the main research subjects in information security. The use of agents fits in a distributed computational environment and it provides an effective method for detecting distributed attacks. However, when agents are used, as software entities they are exposed to external attacks when they run. It is therefore important to ensure the security of agent entities and the confidentiality and integrity of their exchanged messages. In this paper we analyse the different vulnerabilities of agent-based IDS, review security threats that can be imposed on agents by malicious hosts and provide a classification of these threats before looking further into the need for agent self-defence.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
5. References
TRIPATHI, A.R., KARNIK, N.M., AHMED, T., SINGH, R.D., PRAKASH, A., KAKANI, V., VORA, M.K., AND PATHAK, M. 2001. Design of the Ajanta system for mobile agent programming. The Journal of Systems and Software.
M. Crosbie, G. Spaford, Active defense of a computer system using autonomous agents, Technical Report 95-008, COAST Group, Department of Computer Sciences, Purdue University, West Lafayette, IN 47907-1398, February 1995.
Wayne A. Jansen “INTRUSION DETECTION WITH MOBILE AGENTS” National Institute of Standards and Technology.
JANSEN, W.A. 2000. Countermeasures for Mobile Agent Security. Computer Communications. Special issue on advanced security techniques for network protection. Elsevier Science.
E. H. Spafford and D. Zamboni. Intrusion detection using autonomous agents. Computer Networks, 34(4):547–570, October 2000.
Balasubramaniyan, J., Garcia-Fernandez, J. O., Isacoff, D., Spafford, E. H., and Zamboni, D. An Architecture for Intrusion Detection using Autonomous Agents, Department of Computer Science, Purdue University: Coast TR, 98-05, 1998.
J. B. S. Snapp and G. D. Dids et al. (distributed intrusion detection system) motivation, archi-tecture, and an early prototype. In Fourteenth National Computer Security Conference, Washington, DC, October 1991.
Porras, P.A. and Neumann, P.G. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances, National Information Systems Security Conference, October 1997.
Staniford-Chen, S., Cheung, S., et. al., GrIDS — A Graph Based Intrusion Detection System for Large Networks, In the Proceedings of the 19th National Information Computer Security Conference (Baltimore, MD), October 1996.
G. White, E. Fisch, and U. Pooch. Cooperating security managers: A peer-based intrusion detection system, IEEE Net-work, vol. 10, no. 1, pp. 20–23, 1994.
Deborah Frincke, Don Tobin, Jesse McConnell, Jamie Marconi, and Dean Polla, “A Framework for Cooperative Intrusion Detection,” Twenty-first National Information Systems Security Conference, pp.361–373, October 1998.
Chunsheng Li, Qingfeng Song, and Chengqi Zhang, Senior Member, IEEE MAIDS Architecture for Distributed Intrusion Detection using Mobile Agents. Proceedings of the 2nd International Conference on Information Technology for Application (ICITA 2004).
Wayne Jansen and Tom Karygiannis, “Mobile Agents and Security,” NIST Special Publication 800-19, September 1999.
Günter Karjoth, N. Asokan, and Ceki Gülcü, “Protecting the Computation Results of Free-Roaming Agents,” Second International Workshop on Mobile Agents, Stuttgart, Germany, September 1998.
Sergio Loureiro, Refik Molova and Alain Pannetrat, “Secure Data Collection with Updates,” Workshop on Agents on Electronic Commerce, First Asia Pacific Conference on Intelligent Agent Technology December 1999, pp. 121–130.
Srilekha Mudumbai, Abdeliah Essiari, and William Johnston, “Anchor Toolkit-A Secure Mobile Agent System,” Mobile Agents’ 99 Conference, October 1999.
Joseph Tardo and Luis Valente, “Mobile Agent Security and Telescript,” IEEE COMPCON’ 96, pp.58–63, February 1996.
Bennet S. Yee, “A Sanctuary for Mobile Agents,” Technical Report CS97-537, University of California in San Diego, April 28, 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag London Limited
About this paper
Cite this paper
Oyegoke, E.E., Tryfonas, T., Blyth, A.J. (2006). Exploring Vulnerabilities of Agent-Based Ids: The Need for Agent Self-Defence. In: Blyth, A. (eds) EC2ND 2005. Springer, London. https://doi.org/10.1007/1-84628-352-3_18
Download citation
DOI: https://doi.org/10.1007/1-84628-352-3_18
Publisher Name: Springer, London
Print ISBN: 978-1-84628-311-6
Online ISBN: 978-1-84628-352-9
eBook Packages: Computer ScienceComputer Science (R0)