Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review

View through CrossRef
An Intrusion Detection System (IDS) identifies the attacks by analysing the events, considered undesirable from a security perspective, in systems and networks. It is necessary for organizations to install IDS for the protection of sensitive data due to an increase in the number of incidents related to network security. It is difficult to detect intrusions from a segment that is outside a network as well as an intrusion that originated from inside a distributed network. It should be the responsibility of IDS to analyse a huge amount of data without overloading the networks and monitoring systems. Mobile agents (MA) emerged due to the deficiencies and limitations in centralized IDS. These agents can perform predefined actions by detecting malicious activities. From previously published literature, it was deduced that most of the existing IDS based on MA are not significantly effective due to limited intrusion detection and high detection time. This study categorized existing IDS and available MA-IDS to conduct a strategic review focusing on the classification of each category, that is, data collection modes, architecture, analysis techniques, and security. The limitations and strengths of the discussed IDS are presented/showcased wherever applicable. Additionally, this study suggested ways to improve the efficiency of available MA-IDS in order to secure distributed networks in the future. This overview also includes different implementations of agent based IDS. INDEX TERMS: data mining, distributed systems, Intrusion Detection System (IDS), Mobile Agents (MA), network security
University of Management and Technology
Title: Mobile Agent (MA) Based Intrusion Detection Systems (IDS): A Systematic Review
Description:
An Intrusion Detection System (IDS) identifies the attacks by analysing the events, considered undesirable from a security perspective, in systems and networks.
It is necessary for organizations to install IDS for the protection of sensitive data due to an increase in the number of incidents related to network security.
It is difficult to detect intrusions from a segment that is outside a network as well as an intrusion that originated from inside a distributed network.
It should be the responsibility of IDS to analyse a huge amount of data without overloading the networks and monitoring systems.
Mobile agents (MA) emerged due to the deficiencies and limitations in centralized IDS.
These agents can perform predefined actions by detecting malicious activities.
From previously published literature, it was deduced that most of the existing IDS based on MA are not significantly effective due to limited intrusion detection and high detection time.
This study categorized existing IDS and available MA-IDS to conduct a strategic review focusing on the classification of each category, that is, data collection modes, architecture, analysis techniques, and security.
The limitations and strengths of the discussed IDS are presented/showcased wherever applicable.
Additionally, this study suggested ways to improve the efficiency of available MA-IDS in order to secure distributed networks in the future.
This overview also includes different implementations of agent based IDS.
INDEX TERMS: data mining, distributed systems, Intrusion Detection System (IDS), Mobile Agents (MA), network security.

Related Results

Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
Do evidence summaries increase health policy‐makers' use of evidence from systematic reviews? A systematic review
Do evidence summaries increase health policy‐makers' use of evidence from systematic reviews? A systematic review
This review summarizes the evidence from six randomized controlled trials that judged the effectiveness of systematic review summaries on policymakers' decision making, or the most...
Network Intrusion Detection System based on Machine Learning algorithm using UNSW-NB15 Dataset
Network Intrusion Detection System based on Machine Learning algorithm using UNSW-NB15 Dataset
Network play important role in real life and cyber security has become a vital in reaearch.An intrusion detection system (IDS)which is important in Network Intrusion Detectyion Sy...
Machine Learning-Based Intrusion Detection Systems (IDS) for real-time cyber threat monitoring
Machine Learning-Based Intrusion Detection Systems (IDS) for real-time cyber threat monitoring
The continuous increase of cyberattacks in both frequency and complexity has made the security of the network environment in organizations very vital. Innovative and adaptive attac...
Cash‐based approaches in humanitarian emergencies: a systematic review
Cash‐based approaches in humanitarian emergencies: a systematic review
This Campbell systematic review examines the effectiveness, efficiency and implementation of cash transfers in humanitarian settings. The review summarises evidence from five studi...
Block Chain -Integrated IDS: A Decentralized Approach to Threat Detection and Logging
Block Chain -Integrated IDS: A Decentralized Approach to Threat Detection and Logging
Nowadays, the propagation of cyber threats has increased in both scale and complexity, rendering Intrusion Detection Systems (IDS) a common target for evasive attacks. Historical I...
INTELLIGENT INTRUSION DETECTION FOR ENHANCED SECURITY IN CLOUD COMPUTING
INTELLIGENT INTRUSION DETECTION FOR ENHANCED SECURITY IN CLOUD COMPUTING
Advancements of cloud computing called for the storage of big data through the use of clouds but this came with a lot of risk. Thus, this thesis is aimed to manage these risks by p...

Back to Top