Skip to main content

Part of the book series: Studies in Computational Intelligence ((SCI,volume 329))

  • 569 Accesses

Abstract

This chapter presents an adaptive intrusion detection system for distributed environments dedicated to developing agent-based applications. We propose a scalable, flexible and reactive agent based architecture and a lightweight genetic algorithm that recognizes the intruders in an adaptive and automatic way. Our approach is based on monitoring the level of physical resources usage and implies the detection of those agents that manifest an abusive behavior. We finally enhance Jade with our intrusion detection system and we analyze and illustrate the results obtained in different scenario cases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellifemine, F., Caire, G., Poggi, A., Rimassa, G.: JADE: A software framework for developing multi-agent applications (2008)

    Google Scholar 

  2. Balasubramaniyan, J.S., Garcia-Fernandez, J.O., Isacoff, D., Spafford, E., Zamboni, D.: An architecture for intrusion detection using autonomous agents. In: Proceedings of the 14th IEEE Computer Security Applications Conference (1998)

    Google Scholar 

  3. Crosbie, M., Spafford, G.: Applying genetic programming to intrusion detection. In: Working Notes for the AAAI Symposium on Genetic Programming, pp. 1–8 (1995)

    Google Scholar 

  4. Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. Journal of Computer Security 6(3), 151–180 (1998)

    Google Scholar 

  5. Kim, J., Bentley, P.J.: Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection. In: Proceedings of the 2002 Congress on Evolutionary Computation, pp. 1015–1020. IEEE Press, Piscataway (2002)

    Google Scholar 

  6. Li, W.: Using genetic algorithm for network intrusion detection. In: Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference, Kansas City, Kansas, pp. 24–27. Citeseer (2004)

    Google Scholar 

  7. Nguyen, G.T., Dang, T.T., Hluchy, L., Balogh, Z., Laclavik, M., Budinska, I.: Agent platform evaluation and comparison. II-SAS, Pellucid EU 5FP IST-2001-34519 RTD, Technical report (June 2002)

    Google Scholar 

  8. Spafford, E.H., Zamboni, D.: Intrusion detection using autonomous agents. Computer Networks 34(4), 547–570 (2000)

    Article  Google Scholar 

  9. Xu, H., Shatz, S.M.: Adk: An agent development kit based on a formal design model for multi-agent systems. Automated Software Engineering 10(4), 337–365 (2003)

    Article  Google Scholar 

  10. Nwana, H.S., Ndumu, D.T., Lee, L.C., Collis, J.C.: ZEUS: a toolkit and approach for building distributed multi-agent systems. In: Proceedings of the Third Annual Conference on Autonomous Agents, pp. 360–361. ACM, New York (1999)

    Chapter  Google Scholar 

  11. Bace, R., Mell, P.: Intrusion detection systems. National Institute of Standards and Technology (NIST), Special Publication 800-31 (2001)

    Google Scholar 

  12. Winikoff, M.: JACKTM intelligent agents: An industrial strength platform. In: Bordini et al. [5], pp. 175–193

    Google Scholar 

  13. Bergenti, F., Poggi, A.: Leap: A fipa platform for handheld and mobile devices. LNCS, pp. 436–446 (2002)

    Google Scholar 

  14. Ghit, B., Voicu, O., Pop, F., Cristea, V.: Distributed Agent Platform with Intrusion Detection Capabilities. In: International Conference on Intelligent Networking and Collaborative Systems, INCOS 2009, pp. 81–86 (2009)

    Google Scholar 

  15. Gen, M., Cheng, R.: Genetic algorithms and engineering design. Wiley-Interscience, Hoboken (1997)

    Google Scholar 

  16. Mukherjee, B., Heberlein, T.L., Levitt, K.N.: Network intrusion detection. IEEE Network 8(3), 26–41 (1994)

    Article  Google Scholar 

  17. Crosbie, M., Spafford, G.: Active defense of a computer system using autonomous agents. Technical Report 95-008, COAST Group, Department of Computer Sciences, Purdue University, West Lafayette, IN 47907-1398 (February 1995)

    Google Scholar 

  18. Mosqueira-Rey, E., Alonso-Betanzos, A., Rio, B.B., Pieiro, J.L.: A Misuse Detection Agent for Intrusion Detection in a Multiagent Architecture. In: Nguyen, N.T., Grzech, A., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2007. LNCS (LNAI), vol. 4496, pp. 466–475. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  19. Al-Ibaisi, T., Abu-Dalhoum, A.E., Al-Rawi, M., Alfonseca, M., Ortega, A.: Network intrusion detection using genetic algorithm to find best DNA signature. WTOS 7(7), 589–599 (2008)

    Google Scholar 

  20. Watkins, A.: An immunological approach to intrusion detection. In: Proceedings of 12th Annual Canadian Information Technology Security Symposium. Citeseer (2000)

    Google Scholar 

  21. Dasgupta, D., Gonzalez, F.: An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation 6(3), 281–291 (2002)

    Article  Google Scholar 

  22. Bellifemine, F.L., Caire, G., Greenwood, D.: Developing Multi-Agent Systems with JADE. Wiley Series in Agent Technology. John Wiley & Sons, Chichester (2007)

    Book  Google Scholar 

  23. Kephart, J.O.: A biologically inspired immune system for computers. In: Proceedings of 4th International Workshop on Synthesis and Simulation of Living Systems, Cambridge, Massachusetts, USA, pp. 130–139 (1994)

    Google Scholar 

  24. Kephart, J.O., White, S.R.: Directed-graph epidemiological models of computer viruses. In: Computation: the micro and the macro view, p. 71 (1992)

    Google Scholar 

  25. Collis, J.C., Ndumu, D.T., Nwana, H.S., Lee, L.C.: The ZEUS Agent Building Tool-kit. BT Technology Journal 16(3), 60–68 (1998)

    Article  Google Scholar 

  26. JADE A FIPA-compliant agent framework. Fabio Bellifemine, Agostino Poggi, Giovanni Rimassa (2008)

    Google Scholar 

  27. Saniee Abadeh, M., Habibi, J., Barzegar, Z., Sergi, M.: A parallel genetic local search algorithm for intrusion detection in computer networks. Eng. Appl. Artif. Intell. 20(8), 1058–1069 (2007)

    Article  Google Scholar 

  28. Banković, Z., Stepanović, D., Bojanić, S., Nieto-Taladriz, O.: Improving network security using genetic algorithm approach. Comput. Electr. Eng. 33(5-6), 438–451 (2007)

    Article  Google Scholar 

  29. Nicosia, G., Rinaudo, S., Sciacca, E.: An evolutionary algorithm-based approach to robust analog circuit design using constrained multi-objective optimization, Knowledge-Based Systems. In: The 27th SGAI International Conference on Artificial Intelligence, AI 2007, vol. 21(3), pp. 175–183 (April 2008) ISSN 0950-7051

    Google Scholar 

  30. Mago, V.K., Devi, M.S.: A Multi-agent Medical System for Indian Rural Infant and Child Care. In: Int. Joint Conference on AI, pp. 1396–1401 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Ghit, B., Pop, F., Cristea, V. (2010). Intrusion Detection in Multi-Agent Systems. In: Caballé, S., Xhafa, F., Abraham, A. (eds) Intelligent Networking, Collaborative Systems and Applications. Studies in Computational Intelligence, vol 329. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16793-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16793-5_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16792-8

  • Online ISBN: 978-3-642-16793-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics