The use of mobile agents in tracing an intruder in a local area network

Midori Asaka, T. Onabuta, T. Inoue, Shigeki Goto

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    We are developing an intrusion detection agent system called IDA. Not only can the IDA detect an intrusion, it can also trace the route of the intrusion in a local area network. It is very important for administrators to know where an intruder is coming from and which machines the intruder hopped and compromised in the LAN because the administrators must restore the compromised systems, especially the system attacked first, in order to help prevent intrusions again. When a mark is detected indicating that an intruder might leave, the IDA starts collecting information related to the mark as it traces the candidate. The system analyzes the information and decides whether an intrusion has occurred. In the IDA, mobile agents collect information from the target systems across the network and trace the intruder. The mobile agents collect information only related to the intrusion. Therefore, the IDA can reduce analyzing overhead and network bandwidth loss.

    Original languageEnglish
    Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Pages373-382
    Number of pages10
    Volume1886 LNAI
    Publication statusPublished - 2000
    Event6th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2000 - Melbourne, VIC
    Duration: 2000 Aug 282000 Sep 1

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume1886 LNAI
    ISSN (Print)03029743
    ISSN (Electronic)16113349

    Other

    Other6th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2000
    CityMelbourne, VIC
    Period00/8/2800/9/1

    ASJC Scopus subject areas

    • Computer Science(all)
    • Theoretical Computer Science

    Fingerprint Dive into the research topics of 'The use of mobile agents in tracing an intruder in a local area network'. Together they form a unique fingerprint.

  • Cite this

    Asaka, M., Onabuta, T., Inoue, T., & Goto, S. (2000). The use of mobile agents in tracing an intruder in a local area network. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1886 LNAI, pp. 373-382). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1886 LNAI).