Skip to main navigation Skip to search Skip to main content

Cooperative Itinerant Agents (CIA): Security scheme for intrusion detection systems

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

Intrusion Detection Systems (IDSs) detect suspicious activities and possible intrusions in a system or a particular network at the moment at which these happen. To achieve their objectives the different entities that compose the IDS need to communicate with each other. Thus, it is important to keep in mind the integrity of the information, authentication and access control. Agents provide flexibility and distributed processing of the network traffic but increase the risk of possible intrusions. In this paper we present a new security scheme to verify the entities' integrity of an Intrusion Detection System based on autonomous agents throughout mobile cooperative agents using watermarking software techniques. Furthermore, software fingerprinting is used to assign a different mark to each IDS's entity in order to detect a possible collusion attack.

Original languageEnglish
Title of host publicationInternational Conference on Internet Surveillance and Protection, ICISP'06
PublisherIEEE Computer Society
Pages26-31
Number of pages6
ISBN (Print)0769526497, 9780769526492
DOIs
StatePublished - 2006
Externally publishedYes
EventInternational Conference on Internet Surveillance and Protection, ICISP'06 - Cote d'Azur, France
Duration: 26 Aug 200628 Aug 2006

Publication series

NameInternational Conference on Internet Surveillance and Protection, ICISP'06

Conference

ConferenceInternational Conference on Internet Surveillance and Protection, ICISP'06
Country/TerritoryFrance
CityCote d'Azur
Period26/08/0628/08/06

Keywords

  • Fingerprinting
  • IDS
  • Intrusion detection systems
  • Mobile agents
  • Multi-agent systems
  • Watermarking

Fingerprint

Dive into the research topics of 'Cooperative Itinerant Agents (CIA): Security scheme for intrusion detection systems'. Together they form a unique fingerprint.

Cite this