{"title":"Mobile agents for computer intrusion detection","authors":"S. Foo, M. Arradondo","doi":"10.1109/SSST.2004.1295712","DOIUrl":null,"url":null,"abstract":"In the age of the Internet, computer intrusion detections are at best a black art. The science to perceive, track, and understand intrusions is still at its infancy. Many different technologies and topologies are under investigation to see which model provides adequate data for intrusion detection. In this paper, we present a platform independent Java-based mobile agent intrusion detection system (IDS). In our prototype mobile agent IDS, the focus is on port scanning and file integrity checking. The mobile agents are implemented using the Concordia mobile agent development kit. The performance and memory resources required to run these mobile agents are discussed.","PeriodicalId":309617,"journal":{"name":"Thirty-Sixth Southeastern Symposium on System Theory, 2004. Proceedings of the","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Thirty-Sixth Southeastern Symposium on System Theory, 2004. Proceedings of the","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSST.2004.1295712","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
In the age of the Internet, computer intrusion detections are at best a black art. The science to perceive, track, and understand intrusions is still at its infancy. Many different technologies and topologies are under investigation to see which model provides adequate data for intrusion detection. In this paper, we present a platform independent Java-based mobile agent intrusion detection system (IDS). In our prototype mobile agent IDS, the focus is on port scanning and file integrity checking. The mobile agents are implemented using the Concordia mobile agent development kit. The performance and memory resources required to run these mobile agents are discussed.