Javascript must be enabled to continue!
Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review
View through CrossRef
An Intrusion Detection System (IDS) identifies the attacks by analysing the events, considered undesirable from a security perspective, in systems and networks. It is necessary for organizations to install IDS for the protection of sensitive data due to an increase in the number of incidents related to network security. It is difficult to detect intrusions from a segment that is outside a network as well as an intrusion that originated from inside a distributed network. It should be the responsibility of IDS to analyse a huge amount of data without overloading the networks and monitoring systems. Mobile agents (MA) emerged due to the deficiencies and limitations in centralized IDS. These agents can perform predefined actions by detecting malicious activities. From previously published literature, it was deduced that most of the existing IDS based on MA are not significantly effective due to limited intrusion detection and high detection time. This study categorized existing IDS and available MA-IDS to conduct a strategic review focusing on the classification of each category, that is, data collection modes, architecture, analysis techniques, and security. The limitations and strengths of the discussed IDS are presented/showcased wherever applicable. Additionally, this study suggested ways to improve the efficiency of available MA-IDS in order to secure distributed networks in the future. This overview also includes different implementations of agent based IDS.
INDEX TERMS: data mining, distributed systems, Intrusion Detection System (IDS), Mobile Agents (MA), network security
Title: Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review
Description:
An Intrusion Detection System (IDS) identifies the attacks by analysing the events, considered undesirable from a security perspective, in systems and networks.
It is necessary for organizations to install IDS for the protection of sensitive data due to an increase in the number of incidents related to network security.
It is difficult to detect intrusions from a segment that is outside a network as well as an intrusion that originated from inside a distributed network.
It should be the responsibility of IDS to analyse a huge amount of data without overloading the networks and monitoring systems.
Mobile agents (MA) emerged due to the deficiencies and limitations in centralized IDS.
These agents can perform predefined actions by detecting malicious activities.
From previously published literature, it was deduced that most of the existing IDS based on MA are not significantly effective due to limited intrusion detection and high detection time.
This study categorized existing IDS and available MA-IDS to conduct a strategic review focusing on the classification of each category, that is, data collection modes, architecture, analysis techniques, and security.
The limitations and strengths of the discussed IDS are presented/showcased wherever applicable.
Additionally, this study suggested ways to improve the efficiency of available MA-IDS in order to secure distributed networks in the future.
This overview also includes different implementations of agent based IDS.
INDEX TERMS: data mining, distributed systems, Intrusion Detection System (IDS), Mobile Agents (MA), network security.
Related Results
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract
The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
Do evidence summaries increase health policy‐makers' use of evidence from systematic reviews? A systematic review
Do evidence summaries increase health policy‐makers' use of evidence from systematic reviews? A systematic review
This review summarizes the evidence from six randomized controlled trials that judged the effectiveness of systematic review summaries on policymakers' decision making, or the most...
Network Intrusion Detection System based on Machine Learning algorithm using UNSW-NB15 Dataset
Network Intrusion Detection System based on Machine Learning algorithm using UNSW-NB15 Dataset
Network play important role in real life and cyber security has become a vital in reaearch.An intrusion detection system (IDS)which is important in Network Intrusion Detectyion Sy...
Machine Learning-Based Intrusion Detection Systems (IDS) for real-time cyber threat monitoring
Machine Learning-Based Intrusion Detection Systems (IDS) for real-time cyber threat monitoring
The continuous increase of cyberattacks in both frequency and complexity has made the security of the network environment in organizations very vital. Innovative and adaptive attac...
Cash‐based approaches in humanitarian emergencies: a systematic review
Cash‐based approaches in humanitarian emergencies: a systematic review
This Campbell systematic review examines the effectiveness, efficiency and implementation of cash transfers in humanitarian settings. The review summarises evidence from five studi...
Block Chain -Integrated IDS: A Decentralized Approach to Threat Detection and Logging
Block Chain -Integrated IDS: A Decentralized Approach to Threat Detection and Logging
Nowadays, the propagation of cyber threats has increased in both scale and complexity, rendering Intrusion Detection Systems (IDS) a common target for evasive attacks. Historical I...
Enhancing Intrusion Detection Systems: A Unified Framework Leveraging User Personality Behavior Analysis to Detect Insider Threats and Social Engineering Attacks through Deep Learning
Enhancing Intrusion Detection Systems: A Unified Framework Leveraging User Personality Behavior Analysis to Detect Insider Threats and Social Engineering Attacks through Deep Learning
Insider threats and social engineering attacks (SEAs) pose significant challenges in cybersecurity (CS), often resulting in data breaches and substantial financial losses. Insider ...
INTELLIGENT INTRUSION DETECTION FOR ENHANCED SECURITY IN CLOUD COMPUTING
INTELLIGENT INTRUSION DETECTION FOR ENHANCED SECURITY IN CLOUD COMPUTING
Advancements of cloud computing called for the storage of big data through the use of clouds but this came with a lot of risk. Thus, this thesis is aimed to manage these risks by p...

