Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review

  • Farzana Kausar Gondal Deparment of Computer Science, Gold Campus, Superior University, Lahore, Pakistan
Keywords: Network security, IDS, Mobile Agents, Intrusion Detection, distributed systems

Abstract

Abstract Views: 113

An Intrusion Detection System (IDS) identifies the attacks by analysing the events, considered undesirable from a security perspective, in systems and networks. It is necessary for organizations to install IDS for the protection of sensitive data due to an increase in the number of incidents related to network security. It is difficult to detect intrusions from a segment that is outside a network as well as an intrusion that originated from inside a distributed network. It should be the responsibility of IDS to analyse a huge amount of data without overloading the networks and monitoring systems. Mobile agents (MA) emerged due to the deficiencies and limitations in centralized IDS. These agents can perform predefined actions by detecting malicious activities. From previously published literature, it was deduced that most of the existing IDS based on MA are not significantly effective due to limited intrusion detection and high detection time. This study categorized existing IDS and available MA-IDS to conduct a strategic review focusing on the classification of each category, that is, data collection modes, architecture, analysis techniques, and security. The limitations and strengths of the discussed IDS are presented/showcased wherever applicable. Additionally, this study suggested ways to improve the efficiency of available MA-IDS in order to secure distributed networks in the future. This overview also includes different implementations of agent based IDS.

INDEX TERMS: data mining, distributed systems, Intrusion Detection System (IDS), Mobile Agents (MA), network security

Downloads

Download data is not yet available.

References

X. Sun, Y. Zhang, and R. Liu, "Design of security integrated monitoring system based on Internet of things," in 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE), 2021, pp. 429-432. htps://doi.org/10.1109/ICISCAE52414.2021.9590670

S. A. Onashoga, A. D. Akinde, and A. S. Sodiya, "A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems," Issues in Informing Science & Information Technology, vol. 6, 2009.

N. Patil, C. Das, S. Patankar, and K. Pol, "Analysis of distributed intrusion detection systems using mobile agents," in 2008 First International Conference on Emerging Trends in Engineering and Technology, 2008, pp. 1255-1260.

D. Gurven Vaseer and P. S. Patheja, "Intrusion Detection a Challenge: SNORT the savior", International Journal of Computer Trendsand Technology, Vol 45, 2017

A. Thakkar and R. Lohiya, "A review of the advancement in intrusion detection datasets," Procedia Computer Science, vol. 167,pp. 636-645, 2020.

F. Z. Belgrana, N. Benamrane, M. A. Hamaida, A. M. Chaabani, and A. Taleb-Ahmed, "Network intrusion detection system using neural network and condensed nearest neighbors with selection of NSL-KDD influencing features," in 2020 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS), 2021, pp. 23-29.htps://doi.org/10.1109/IoTaIS50849.2021.9359689

A. Khraisat and A. Alazab, "A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges," Cybersecurity, vol. 4, pp. 1-27, 2021.https://doi.org/10.1186/s42400-021-00077-7

W. Jansen, W. Jansen, T. Karygiannis, and D. Marks, Applying mobile agents to intrusion detection and response: US Department of Commerce, National Institute of Standards and Technology, 1999.

Z. Mu,H. Liuand C. Liu,“Design and implementation of network intrusion detection system,”In2020 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), IEEE, 2020,494-497,2020.

A. Thakkar and R. Lohiya, "A survey on intrusion

Mobile Agent (MA) Based IntrusionDetection...100Innovative Computing ReviewVolume 1 Issue 2, Winter2021detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions," Artificial Intelligence Review, pp. 1-111, 2021. https://doi.org/10.1007/s10462-021-10037-9[

O. M. Okonor, "Improving Energy Efficiency in Cloud Computing Data Centres Using Intelligent Mobile Agents," University of Portsmouth, 2021.

G. Tsochev, R. Trifonov, S. Manolov, and G. Pavlova, "Investigation Of Secure Mobile Agents As A Tool In Intrusion Detection Systems," in 2020 International Conference on Mathematics and Computers in Science and Engineering (MACISE), 2020, pp. 114-118.

P. C. Chan and V. K. Wei, "Preemptive distributed intrusion detection using mobile agents," in Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002, pp. 103-108.

R. Leszczyna, "A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks," Moving technology ethics at the forefront of society, organisations and governments, pp. 439-452, 2021.

J. Ernst, T. Hamed, and S. Kremer, "A survey and comparison of performance evaluation in intrusion detectionsystems," in Computer and network security essentials, ed: Springer, 2018, pp. 555-568.

H. Wang, Z. Wang, Q. Zhao, G. Wang, R. Zheng, and D. Liu, "Mobile agents for network intrusion resistance," in Asia-Pacific Web Conference, 2006, pp. 965-970.

N. Patil,C. Das,S. Patankar,and K. Pol,“Analysis of distributed intrusion detection systems using mobile agents,”In2008 First International Conference on Emerging Trends in Engineering and Technology, IEEE, 1255-1260.

T. Hamed, J. B. Ernst, and S. C. Kremer, "A survey and taxonomy of classifiers of intrusion detection systems," in Computer and network security essentials, ed: Springer, 2018, pp. 21-39.

M. Almgren, E. Lundin, and B. E. Jonsson, "Consolidation and evaluation of IDS taxonomies," in In Proceedings of the eighth Nordic Workshop on Secure IT systems (NordSec 2003, 2003.

R. Sharma and V. A. Athavale, "Survey of intrusion detection techniques and architectures in wireless sensor networks," International Journal of Advanced Networking and Applications, vol. 10, pp. 3925-3937, 2019.

R. Lips and N. El-Kadhi, "Intelligent Mobile Agent for Intrusion Detection System (IMAIDS)," European Institute of Technology. rue Pasteur-94270, Le Kremlin-France, 2008.

M. A. Hatef, V. Shaker, M. R. Jabbarpour, J. Jung, and H. Zarrabi, "HIDCC: A hybrid intrusion detection approach in cloud computing," Concurrency and Computation: Practice and Experience, vol. 30, p. e4171, 2018.

J. P. Anderson, "Computer security threat monitoring andsurveillance," Technical Report, James P. Anderson Company, 1980.

M. Özalp, C. Karakuzu, and A. Zengin, "Distributed intrusion detection systems: A survey," Academic Perspective Procedia, vol. 2, pp. 400-407, 2019. https://doi.org/10.33793/acperpro.02.03.18

J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, E. Spafford, and D. Zamboni, "An architecture for intrusion detection using autonomous agents,"in Proceedings 14th annual computer security applications conference (Cat. No. 98EX217), 1998, pp. 13-24.

R. Lips and N. El-Kadhi, "Intelligent Mobile Agent for Intrusion Detection System (IMAIDS)," European Institute of Technology. rue Pasteur-94270, Le Kremlin-France, 2008.

K. Deeter, K. Singh, S. Wilson, L. Filipozzi, and S.

Mobile Agent (MA) Based IntrusionDetectionVuong, "APHIDS: A mobile agent-based programmable hybrid intrusion detection system," in International Workshop on Mobile Agents for Telecommunication Applications, 2004, pp. 244-253.

H. Wang, Z. Wang, Q. Zhao, G. Wang, R. Zheng, and D. Liu, "Mobile agents for network intrusion resistance," in Asia-Pacific Web Conference, 2006, pp. 965-970.

M. Asaka, A. Taguchi, and S. Goto, "The implementation of IDA: An intrusion detection agent system," in Proceedings of the 11th FIRST Conference, 1999.

M. Eid, H. Artail, A. Kayssi, and A. Chehab, "Trends in mobile agent applications," Journal of Research and Practice in Information Technology, vol. 37, pp. 323-351, 2005.

M. El Fissaoui, A. Beni-hssane, S. Ouhmad, and K. El Makkaoui, "A survey on mobile agent itinerary planning for information fusion in wireless sensor networks," Archives of Computational Methods in

Published
2021-12-26
How to Cite
Gondal, F. K. (2021). Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review. Innovative Computing Review, 1(2), 85-102. https://doi.org/10.32350/icr.0102.05
Section
Articles