Skip to main content

Exploring Vulnerabilities of Agent-Based Ids: The Need for Agent Self-Defence

  • Conference paper
Book cover EC2ND 2005

Abstract

Distributed intrusion detection is considered as a robust technique for the detection of complicated attacks in high traffic flow and heterogeneous network environment. It has become one of the main research subjects in information security. The use of agents fits in a distributed computational environment and it provides an effective method for detecting distributed attacks. However, when agents are used, as software entities they are exposed to external attacks when they run. It is therefore important to ensure the security of agent entities and the confidentiality and integrity of their exchanged messages. In this paper we analyse the different vulnerabilities of agent-based IDS, review security threats that can be imposed on agents by malicious hosts and provide a classification of these threats before looking further into the need for agent self-defence.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

5. References

  1. TRIPATHI, A.R., KARNIK, N.M., AHMED, T., SINGH, R.D., PRAKASH, A., KAKANI, V., VORA, M.K., AND PATHAK, M. 2001. Design of the Ajanta system for mobile agent programming. The Journal of Systems and Software.

    Google Scholar 

  2. M. Crosbie, G. Spaford, Active defense of a computer system using autonomous agents, Technical Report 95-008, COAST Group, Department of Computer Sciences, Purdue University, West Lafayette, IN 47907-1398, February 1995.

    Google Scholar 

  3. Wayne A. Jansen “INTRUSION DETECTION WITH MOBILE AGENTS” National Institute of Standards and Technology.

    Google Scholar 

  4. JANSEN, W.A. 2000. Countermeasures for Mobile Agent Security. Computer Communications. Special issue on advanced security techniques for network protection. Elsevier Science.

    Google Scholar 

  5. E. H. Spafford and D. Zamboni. Intrusion detection using autonomous agents. Computer Networks, 34(4):547–570, October 2000.

    Article  Google Scholar 

  6. Balasubramaniyan, J., Garcia-Fernandez, J. O., Isacoff, D., Spafford, E. H., and Zamboni, D. An Architecture for Intrusion Detection using Autonomous Agents, Department of Computer Science, Purdue University: Coast TR, 98-05, 1998.

    Google Scholar 

  7. J. B. S. Snapp and G. D. Dids et al. (distributed intrusion detection system) motivation, archi-tecture, and an early prototype. In Fourteenth National Computer Security Conference, Washington, DC, October 1991.

    Google Scholar 

  8. Porras, P.A. and Neumann, P.G. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances, National Information Systems Security Conference, October 1997.

    Google Scholar 

  9. Staniford-Chen, S., Cheung, S., et. al., GrIDS — A Graph Based Intrusion Detection System for Large Networks, In the Proceedings of the 19th National Information Computer Security Conference (Baltimore, MD), October 1996.

    Google Scholar 

  10. G. White, E. Fisch, and U. Pooch. Cooperating security managers: A peer-based intrusion detection system, IEEE Net-work, vol. 10, no. 1, pp. 20–23, 1994.

    Article  Google Scholar 

  11. Deborah Frincke, Don Tobin, Jesse McConnell, Jamie Marconi, and Dean Polla, “A Framework for Cooperative Intrusion Detection,” Twenty-first National Information Systems Security Conference, pp.361–373, October 1998.

    Google Scholar 

  12. Chunsheng Li, Qingfeng Song, and Chengqi Zhang, Senior Member, IEEE MAIDS Architecture for Distributed Intrusion Detection using Mobile Agents. Proceedings of the 2nd International Conference on Information Technology for Application (ICITA 2004).

    Google Scholar 

  13. Wayne Jansen and Tom Karygiannis, “Mobile Agents and Security,” NIST Special Publication 800-19, September 1999.

    Google Scholar 

  14. Günter Karjoth, N. Asokan, and Ceki Gülcü, “Protecting the Computation Results of Free-Roaming Agents,” Second International Workshop on Mobile Agents, Stuttgart, Germany, September 1998.

    Google Scholar 

  15. Sergio Loureiro, Refik Molova and Alain Pannetrat, “Secure Data Collection with Updates,” Workshop on Agents on Electronic Commerce, First Asia Pacific Conference on Intelligent Agent Technology December 1999, pp. 121–130.

    Google Scholar 

  16. Srilekha Mudumbai, Abdeliah Essiari, and William Johnston, “Anchor Toolkit-A Secure Mobile Agent System,” Mobile Agents’ 99 Conference, October 1999.

    Google Scholar 

  17. Joseph Tardo and Luis Valente, “Mobile Agent Security and Telescript,” IEEE COMPCON’ 96, pp.58–63, February 1996.

    Google Scholar 

  18. Bennet S. Yee, “A Sanctuary for Mobile Agents,” Technical Report CS97-537, University of California in San Diego, April 28, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag London Limited

About this paper

Cite this paper

Oyegoke, E.E., Tryfonas, T., Blyth, A.J. (2006). Exploring Vulnerabilities of Agent-Based Ids: The Need for Agent Self-Defence. In: Blyth, A. (eds) EC2ND 2005. Springer, London. https://doi.org/10.1007/1-84628-352-3_18

Download citation

  • DOI: https://doi.org/10.1007/1-84628-352-3_18

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84628-311-6

  • Online ISBN: 978-1-84628-352-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics