APHIDS++: Evolution of A Programmable Hybrid Intrusion Detection System

  • Mohammed S. Alam
  • Abhishek Gupta
  • Jake Wires
  • Son Vuong
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3744)


With the rapid growth of the Internet and the ever-increasing security problems associated with its popularity, the need for protection against unwanted intruders has become imperative. Antivirus software, intrusion detection systems, spyware detectors, and mal-ware detectors are some of the protection mechanisms available to users today. The diversity of these manifold systems suggests the need for a unifying managerial system, such as APHIDS (A Programmable Hybrid Intrusion Detection System), which can correlate and coalesce preexisting security components. In this paper we provide a description of improvements made to the initial APHIDS design, comprising the introduction of agent caching, the addition of an optional intelligent agent, and an XML implementation of our Distributed Correlation Script (DCS).


Intrusion Detection Mobile Agent Intrusion Detection System Policy Agent Bandwidth Consumption 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Deeter, K., Singh, K., Wilson, S., Fillipozzi, L., Vuong, S.: APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System. In: Karmouch, A., Korba, L., Madeira, E.R.M. (eds.) MATA 2004. LNCS, vol. 3284, pp. 244–253. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  2. 2.
    Roesch, M.: Snort - lightweight intrusion detection system for networks. In: Proceedings of USENIX LISA 1999 (1999)Google Scholar
  3. 3.
    Balasubramanian, J., Garcia-Fernandez, J., Isacoff, D., Spafford, E., Zamboni, D.: An archi-tecture for intrusion detection using autonomous agents. Technical Report 98/05, COAST Laboratory, Purdue University (1998)Google Scholar
  4. 4.
    Asaka, M., Taguchi, A., Goto, S.: The implementation of IDA: An intrusion detection agent system. In: Proceedings of the 11th FIRST Conference (1999)Google Scholar
  5. 5.
    Queiroz, J., Carmo, L., Pirmez, L.: Micael: An autonomous mobile agent system to protect new generation networked applications. In: 2nd Annual Workshop on Recent Advances in Intrusion Detection (1999)Google Scholar
  6. 6.
    Kruegel, C., Toth, T.: Sparta - a mobile agent based intrusion detection system. In: Proceed-ings of the IFIP Conference on Network Security, I-NetSec (2001)Google Scholar
  7. 7.
    Li, C., Song, Q., Zhang, C.: Ma-ids architecture for distributed intrusion detection using mobile agents. In: Proceedings of the 2nd International Conference on Information Technology for Application, ICITA 2004 (2004)Google Scholar
  8. 8.
    Deeter, K.: APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System. Masters thesis, Department of Computer Science, UBC (2004)Google Scholar
  9. 9.
    Singh, K., Vuong, S.: Blaze: a mobile agent paradigm for VoIP Intrusion Detection Systems. In: Proceedings of ICETE 2004 - First International Conference on E-Business and Tele-communication Networks, Setubal, Portugal (2004)Google Scholar
  10. 10.
    Cabri, G., Leonardi, L., Zambonelli, F.: XML Dataspaces for Mobile Agent Coordination. In: Symposium on Applied Computing, pp. 181–188 (2000)Google Scholar
  11. 11.
    Debar, H., Curry, D., Feinstein, B.: The Intrusion Detection Message Exchange Format, draft-ietf-idwg-idmef-xml-14.txt (2005)Google Scholar
  12. 12.
    Grasshopper (2003),

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Mohammed S. Alam
    • 1
  • Abhishek Gupta
    • 1
  • Jake Wires
    • 1
  • Son Vuong
    • 1
  1. 1.Department of Computer ScienceUniversity of British ColumbiaVancouverCanada

Personalised recommendations