DIDMA: A Distributed Intrusion Detection System Using Mobile Agents
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project report helper
Active In SP

Posts: 2,270
Joined: Sep 2010
13-10-2010, 10:12 AM

.pdf   _DIDS_Agentes.pdf (Size: 109.19 KB / Downloads: 76)
DIDMA: A Distributed Intrusion Detection System Using Mobile Agents

Pradeep Kannadiga and Mohammad Zulkernine
School of Computing
Queen’s University, Kingston
Ontario, Canada K7L 3N6

The widespread proliferation of Internet connections
has made current computer networks more
vulnerable to intrusions than before. In network
intrusions, there may be multiple computing nodes
that are attacked by intruders. The evidences of
intrusions have to be gathered from all such attacked
nodes. An intruder may move between multiple nodes
in the network to conceal the origin of attack, or
misuse some compromised hosts to launch the attack
on other nodes. To detect such intrusion activities
spread over the whole network, we present a new
intrusion detection system (IDS) called Distributed
Intrusion Detection using Mobile Agents (DIDMA).
DIDMA uses a set of software entities called mobile
agents that can move from one node to another node
within a network, and perform the task of
aggregation and correlation of the intrusion related
data that it receives from another set of software
entities called the static agents. Mobile agents reduce
network bandwidth usage by moving data analysis
computation to the location of the intrusion data,
support heterogeneous plat-forms, and offer a lot of
flexibility in creating a distributed IDS. DIDMA
utilizes the above-mentioned beneficial features
offered by mobile agent technology and addresses
some of the issues with centralized IDS models. The
detailed architecture and implementation of a
prototype of DIDMA are described. It has been tested
using some well-known attacks and performances
have been com-pared with centralized IDS models.
Active In SP

Posts: 1
Joined: Jan 2011
24-01-2011, 01:54 AM

please send me the ppt

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DETECTION OF WORMHOLE ATTACK IN MANET seminar ideas 5 1,399 26-08-2015, 12:37 AM
Last Post: Leenas
  Cut Detection in Wireless Sensor Networks pdf project girl 2 1,272 16-07-2015, 09:21 PM
Last Post: Guest
  Load Rebalancing for Distributed File Systems in Clouds seminar tips 3 1,805 13-04-2015, 05:21 PM
Last Post: shilpavpius
  advantages and disadvantages of mobile phones in telugu jaseelati 0 232 07-02-2015, 02:21 PM
Last Post: jaseelati
  mobile phone based attendance tracking system ppt jaseelati 0 330 30-01-2015, 01:57 PM
Last Post: jaseelati
  mobile advantages and disadvantages in hindi wikipedia jaseelati 0 653 29-01-2015, 01:49 PM
Last Post: jaseelati
  mobile data internetworking standards jaseelati 0 333 29-01-2015, 01:15 PM
Last Post: jaseelati
  analysis on credit card fraud detection methods ppt jaseelati 0 154 22-01-2015, 02:45 PM
Last Post: jaseelati
  credit card fraud detection using hidden markov model project download jaseelati 0 298 10-01-2015, 01:34 PM
Last Post: jaseelati
  analysis on credit card fraud detection methods ppt jaseelati 0 148 09-01-2015, 02:41 PM
Last Post: jaseelati