Abstract
This chapter presents an adaptive intrusion detection system for distributed environments dedicated to developing agent-based applications. We propose a scalable, flexible and reactive agent based architecture and a lightweight genetic algorithm that recognizes the intruders in an adaptive and automatic way. Our approach is based on monitoring the level of physical resources usage and implies the detection of those agents that manifest an abusive behavior. We finally enhance Jade with our intrusion detection system and we analyze and illustrate the results obtained in different scenario cases.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bellifemine, F., Caire, G., Poggi, A., Rimassa, G.: JADE: A software framework for developing multi-agent applications (2008)
Balasubramaniyan, J.S., Garcia-Fernandez, J.O., Isacoff, D., Spafford, E., Zamboni, D.: An architecture for intrusion detection using autonomous agents. In: Proceedings of the 14th IEEE Computer Security Applications Conference (1998)
Crosbie, M., Spafford, G.: Applying genetic programming to intrusion detection. In: Working Notes for the AAAI Symposium on Genetic Programming, pp. 1–8 (1995)
Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. Journal of Computer Security 6(3), 151–180 (1998)
Kim, J., Bentley, P.J.: Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection. In: Proceedings of the 2002 Congress on Evolutionary Computation, pp. 1015–1020. IEEE Press, Piscataway (2002)
Li, W.: Using genetic algorithm for network intrusion detection. In: Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference, Kansas City, Kansas, pp. 24–27. Citeseer (2004)
Nguyen, G.T., Dang, T.T., Hluchy, L., Balogh, Z., Laclavik, M., Budinska, I.: Agent platform evaluation and comparison. II-SAS, Pellucid EU 5FP IST-2001-34519 RTD, Technical report (June 2002)
Spafford, E.H., Zamboni, D.: Intrusion detection using autonomous agents. Computer Networks 34(4), 547–570 (2000)
Xu, H., Shatz, S.M.: Adk: An agent development kit based on a formal design model for multi-agent systems. Automated Software Engineering 10(4), 337–365 (2003)
Nwana, H.S., Ndumu, D.T., Lee, L.C., Collis, J.C.: ZEUS: a toolkit and approach for building distributed multi-agent systems. In: Proceedings of the Third Annual Conference on Autonomous Agents, pp. 360–361. ACM, New York (1999)
Bace, R., Mell, P.: Intrusion detection systems. National Institute of Standards and Technology (NIST), Special Publication 800-31 (2001)
Winikoff, M.: JACKTM intelligent agents: An industrial strength platform. In: Bordini et al. [5], pp. 175–193
Bergenti, F., Poggi, A.: Leap: A fipa platform for handheld and mobile devices. LNCS, pp. 436–446 (2002)
Ghit, B., Voicu, O., Pop, F., Cristea, V.: Distributed Agent Platform with Intrusion Detection Capabilities. In: International Conference on Intelligent Networking and Collaborative Systems, INCOS 2009, pp. 81–86 (2009)
Gen, M., Cheng, R.: Genetic algorithms and engineering design. Wiley-Interscience, Hoboken (1997)
Mukherjee, B., Heberlein, T.L., Levitt, K.N.: Network intrusion detection. IEEE Network 8(3), 26–41 (1994)
Crosbie, M., Spafford, G.: Active defense of a computer system using autonomous agents. Technical Report 95-008, COAST Group, Department of Computer Sciences, Purdue University, West Lafayette, IN 47907-1398 (February 1995)
Mosqueira-Rey, E., Alonso-Betanzos, A., Rio, B.B., Pieiro, J.L.: A Misuse Detection Agent for Intrusion Detection in a Multiagent Architecture. In: Nguyen, N.T., Grzech, A., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2007. LNCS (LNAI), vol. 4496, pp. 466–475. Springer, Heidelberg (2007)
Al-Ibaisi, T., Abu-Dalhoum, A.E., Al-Rawi, M., Alfonseca, M., Ortega, A.: Network intrusion detection using genetic algorithm to find best DNA signature. WTOS 7(7), 589–599 (2008)
Watkins, A.: An immunological approach to intrusion detection. In: Proceedings of 12th Annual Canadian Information Technology Security Symposium. Citeseer (2000)
Dasgupta, D., Gonzalez, F.: An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation 6(3), 281–291 (2002)
Bellifemine, F.L., Caire, G., Greenwood, D.: Developing Multi-Agent Systems with JADE. Wiley Series in Agent Technology. John Wiley & Sons, Chichester (2007)
Kephart, J.O.: A biologically inspired immune system for computers. In: Proceedings of 4th International Workshop on Synthesis and Simulation of Living Systems, Cambridge, Massachusetts, USA, pp. 130–139 (1994)
Kephart, J.O., White, S.R.: Directed-graph epidemiological models of computer viruses. In: Computation: the micro and the macro view, p. 71 (1992)
Collis, J.C., Ndumu, D.T., Nwana, H.S., Lee, L.C.: The ZEUS Agent Building Tool-kit. BT Technology Journal 16(3), 60–68 (1998)
JADE A FIPA-compliant agent framework. Fabio Bellifemine, Agostino Poggi, Giovanni Rimassa (2008)
Saniee Abadeh, M., Habibi, J., Barzegar, Z., Sergi, M.: A parallel genetic local search algorithm for intrusion detection in computer networks. Eng. Appl. Artif. Intell. 20(8), 1058–1069 (2007)
Banković, Z., Stepanović, D., Bojanić, S., Nieto-Taladriz, O.: Improving network security using genetic algorithm approach. Comput. Electr. Eng. 33(5-6), 438–451 (2007)
Nicosia, G., Rinaudo, S., Sciacca, E.: An evolutionary algorithm-based approach to robust analog circuit design using constrained multi-objective optimization, Knowledge-Based Systems. In: The 27th SGAI International Conference on Artificial Intelligence, AI 2007, vol. 21(3), pp. 175–183 (April 2008) ISSN 0950-7051
Mago, V.K., Devi, M.S.: A Multi-agent Medical System for Indian Rural Infant and Child Care. In: Int. Joint Conference on AI, pp. 1396–1401 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Ghit, B., Pop, F., Cristea, V. (2010). Intrusion Detection in Multi-Agent Systems. In: Caballé, S., Xhafa, F., Abraham, A. (eds) Intelligent Networking, Collaborative Systems and Applications. Studies in Computational Intelligence, vol 329. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16793-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-16793-5_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16792-8
Online ISBN: 978-3-642-16793-5
eBook Packages: EngineeringEngineering (R0)