A Survey on Mobile Agent Based Intrusion Detection System

There are many kinds of cybercrimes related to computer networks which are connected to Internet. Intruders attack on multiple computing nodes in network intrusions. An Internet user having malicious intention may access, modify, or delete sensitive information present on other computers. Some of the computer services may be made unavailable to other users. Due to huge and complex infrastructure of computer network. Intrusion Detection System (IDS) is needed. Whenever the confidentiality, integrity, and availability of computer resources are under attack, it will help to detect and respond effectively. From all such attacked nodes the evidences of intrusions have to be gathered. An intruder may move between multiple nodes in the network. Due to this the origin of attack is concealed.

Provided by: International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Topic: Mobility Date Added: Nov 2012 Format: PDF

Find By Topic