Abstract

In this work, a Multiagent-based architecture for Intrusion Detection System (MIDS) is proposed to overcome the shortcoming of current Mobile Agent-based Intrusion Detection System. MIDS is divided into three major phases namely: Data gathering, Detection and the Response phases. The data gathering stage involves data collection based on the features in the distributed system and profiling. The data collection components are distributed on both host and network. Closed Pattern Mining (CPM) algorithm is introduced for profiling users’ activities in network database. The CPM algorithm is built on the concept of Frequent Pattern-growth algorithm by mining a prefix-tree called CPM-tree, which contains only the closed itemsets and its associated support count. According to the administrator’s specified thresholds, CPM-tree maintains only closed patterns online and incrementally outputs the current closed frequent pattern of users’ activities in real time. MIDS makes use of mobile and static agents to carry out the functions of intrusion detection. Each of these agents is built with rule-based reasoning to autonomously detect intrusions. Java 1.1.8 is chosen as the implementation language and IBM’s Java based mobile agent framework, Aglet 1.0.3 as the platform for running the mobile and static agents. In order to test the robustness of the system, a real-time simulation is carried out on University of Agriculture, Abeokuta (UNAAB) network dataset and the results showed an accuracy of 99.94%, False Positive Rate (FPR) of 0.13% and False Negative Rate (FNR) of 0.04%. This shows an improved performance of MIDS when compared with other known MA-IDSs.

Highlights

  • Computer networks, including the Internet, have grown in both size and complexity

  • Multiple Agent system can adopt the characteristic of mobility to carry out activities in a flexible and intelligent manner that is responsive to changes in the environment (Bradshaw, 1997)

  • The drawbacks identified are firstly, the activities at the Upper Level Detection (ULD) could still be integrated with the Level Detection (LLD) to form one-level architecture and have the Controller and Protector (CP) atthe ULD since detection of intrusion at each level is still based on same algorithm

Read more

Summary

A Simulated Multiagent-Based Architecture for Intrusion Detection System

MIDS makes use of mobile and static agents to carry out the functions of intrusion detection Each of these agents is built with rule-based reasoning to autonomously detect intrusions. In order to test the robustness of the system, a real-time simulation is carried out on University of Agriculture, Abeokuta (UNAAB) network dataset and the results showed an accuracy of 99.94%, False Positive Rate (FPR) of 0.13% and False Negative Rate (FNR) of 0.04%. This shows an improved performance of MIDS when compared with other known MA-IDSs

INTRODUCTION
EXISTING RELATED RESEARCHES
PROPOSED ARCHITECTURE
Mids Architecture
IMPLEMENTATION OF MIDS
Testbed Implementation
Performance Evaluation of MIDS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call