The use of mobile agents in tracing an intruder in a local area network

Midori Asaka, T. Onabuta, T. Inoue, Shigeki Goto

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    We are developing an intrusion detection agent system called IDA. Not only can the IDA detect an intrusion, it can also trace the route of the intrusion in a local area network. It is very important for administrators to know where an intruder is coming from and which machines the intruder hopped and compromised in the LAN because the administrators must restore the compromised systems, especially the system attacked first, in order to help prevent intrusions again. When a mark is detected indicating that an intruder might leave, the IDA starts collecting information related to the mark as it traces the candidate. The system analyzes the information and decides whether an intrusion has occurred. In the IDA, mobile agents collect information from the target systems across the network and trace the intruder. The mobile agents collect information only related to the intrusion. Therefore, the IDA can reduce analyzing overhead and network bandwidth loss.

    Original languageEnglish
    Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Pages373-382
    Number of pages10
    Volume1886 LNAI
    Publication statusPublished - 2000
    Event6th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2000 - Melbourne, VIC
    Duration: 2000 Aug 282000 Sep 1

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume1886 LNAI
    ISSN (Print)03029743
    ISSN (Electronic)16113349

    Other

    Other6th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2000
    CityMelbourne, VIC
    Period00/8/2800/9/1

    Fingerprint

    Mobile agents
    Mobile Agent
    Tracing
    Local area networks
    Trace
    Intrusion detection
    Bandwidth
    Agent Systems
    Intrusion Detection
    Target

    ASJC Scopus subject areas

    • Computer Science(all)
    • Theoretical Computer Science

    Cite this

    Asaka, M., Onabuta, T., Inoue, T., & Goto, S. (2000). The use of mobile agents in tracing an intruder in a local area network. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1886 LNAI, pp. 373-382). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1886 LNAI).

    The use of mobile agents in tracing an intruder in a local area network. / Asaka, Midori; Onabuta, T.; Inoue, T.; Goto, Shigeki.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 1886 LNAI 2000. p. 373-382 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1886 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Asaka, M, Onabuta, T, Inoue, T & Goto, S 2000, The use of mobile agents in tracing an intruder in a local area network. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 1886 LNAI, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 1886 LNAI, pp. 373-382, 6th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2000, Melbourne, VIC, 00/8/28.
    Asaka M, Onabuta T, Inoue T, Goto S. The use of mobile agents in tracing an intruder in a local area network. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 1886 LNAI. 2000. p. 373-382. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
    Asaka, Midori ; Onabuta, T. ; Inoue, T. ; Goto, Shigeki. / The use of mobile agents in tracing an intruder in a local area network. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 1886 LNAI 2000. pp. 373-382 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
    @inproceedings{c77b054ee9124401a491742b4459ff7e,
    title = "The use of mobile agents in tracing an intruder in a local area network",
    abstract = "We are developing an intrusion detection agent system called IDA. Not only can the IDA detect an intrusion, it can also trace the route of the intrusion in a local area network. It is very important for administrators to know where an intruder is coming from and which machines the intruder hopped and compromised in the LAN because the administrators must restore the compromised systems, especially the system attacked first, in order to help prevent intrusions again. When a mark is detected indicating that an intruder might leave, the IDA starts collecting information related to the mark as it traces the candidate. The system analyzes the information and decides whether an intrusion has occurred. In the IDA, mobile agents collect information from the target systems across the network and trace the intruder. The mobile agents collect information only related to the intrusion. Therefore, the IDA can reduce analyzing overhead and network bandwidth loss.",
    author = "Midori Asaka and T. Onabuta and T. Inoue and Shigeki Goto",
    year = "2000",
    language = "English",
    isbn = "3540679251",
    volume = "1886 LNAI",
    series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
    pages = "373--382",
    booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

    }

    TY - GEN

    T1 - The use of mobile agents in tracing an intruder in a local area network

    AU - Asaka, Midori

    AU - Onabuta, T.

    AU - Inoue, T.

    AU - Goto, Shigeki

    PY - 2000

    Y1 - 2000

    N2 - We are developing an intrusion detection agent system called IDA. Not only can the IDA detect an intrusion, it can also trace the route of the intrusion in a local area network. It is very important for administrators to know where an intruder is coming from and which machines the intruder hopped and compromised in the LAN because the administrators must restore the compromised systems, especially the system attacked first, in order to help prevent intrusions again. When a mark is detected indicating that an intruder might leave, the IDA starts collecting information related to the mark as it traces the candidate. The system analyzes the information and decides whether an intrusion has occurred. In the IDA, mobile agents collect information from the target systems across the network and trace the intruder. The mobile agents collect information only related to the intrusion. Therefore, the IDA can reduce analyzing overhead and network bandwidth loss.

    AB - We are developing an intrusion detection agent system called IDA. Not only can the IDA detect an intrusion, it can also trace the route of the intrusion in a local area network. It is very important for administrators to know where an intruder is coming from and which machines the intruder hopped and compromised in the LAN because the administrators must restore the compromised systems, especially the system attacked first, in order to help prevent intrusions again. When a mark is detected indicating that an intruder might leave, the IDA starts collecting information related to the mark as it traces the candidate. The system analyzes the information and decides whether an intrusion has occurred. In the IDA, mobile agents collect information from the target systems across the network and trace the intruder. The mobile agents collect information only related to the intrusion. Therefore, the IDA can reduce analyzing overhead and network bandwidth loss.

    UR - http://www.scopus.com/inward/record.url?scp=84867752517&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84867752517&partnerID=8YFLogxK

    M3 - Conference contribution

    SN - 3540679251

    SN - 9783540679257

    VL - 1886 LNAI

    T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    SP - 373

    EP - 382

    BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    ER -