International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 1 - Issue 3, April 2012 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Anomaly detection algorithm using multiagents

[Full Text]



Asmaa Shaker Ashoor,Sharad Gore



NIDS, Anomaly detection, Adaptive Threshold Algorithm, Multi-agents, JADE



A Network intrusion detection system (NIDS) is gaining ever increasing importance in security of the information from network attacks. For better system performance and lesser response time an improved NIDS system is proposed anomaly detection is achieved by using various agents and by implementing adaptive threshold algorithm. Thus utilizing multi agents into the improved NIDS system enhances the system performance and response time, yet achieves higher accuracy and broader spectrum of protection from different types of intrusion attacks. in this work we propose the simple technique of Adaptive Threshold Algorithm that can be used to achieve large improvements in the performance of anomaly agent with using multi agents and less complex structure avoiding dead locks, less bulky operations and faster system response time.



[1] Wang. H., Zhang.D., and Shin.K.G., \"Detecting syn flooding attacks\" , In Proceedings of IEEE INFOCOM (2002).
[2] Thottan, M, and Ji, C., \"Anomaly detection in ip networks\", In IEEE Trans. Signal Processing (Aug. 2003), pp. 2191 { 2204.
[3] Deri, L., Suin, S., and Maselli, G., \"Design and implementation of an anomaly detection system: An empirical approach\", In Proceedings of Terena TNC, 2003 .
[4] Member-Haining Wang and Member-Danlu Zhang and Fellow-Kang G. Shin, \"Change-point monitoring for the detection of dos attacks\" , IEEE Trans. Depend-able Secur. Comput. 1, 4 (2004), 193{208.
[5] Barford, P, Kline J Plonka D, and A, Ron, \"A signal analysis of network traffic anomalies\", In Proceedings of ACM SIGCOMM Internet Measurement Work-shop (Marseilles, France, Nov. 2002).
[6] Cliff C. Zou, Member, IEEEWeibo Gong Fellow IEEE Don Towsley Fellow IEEE, and Lixin Gao, Member, IEEE, \"The monitoring and early detection of internet worms\", IEEE/ACM Transactions on Networking 13, 5 (Oct. 2005).
[7] Gilles Balmisse. Les agents, 2002.
[8] Christophe Pincemaille, Intelligent agent technology, Cork Institute of Technology, 2008.
[9] Fabio Bellifemine1, Agostino Poggi, and Giovanni Rimassa \" Developing Multi-agent Systems with JADE\",2004,
[10] Muhammad Qasim Ali, Adaptive Thersholding for Anomaly Detection Systems, National University of Sciences and Technology, Pakistan, master thesis, 2009.
[11] Hakan Albag \" Network & Agent Based Intrusion Detection Systems\" , Istanbul, http://www.model.in.tum.de/um/courses/seminar/worm/WS0405/albag.pdf
[12] M. Benattou, and K. Tamine, \" Intelligent Agents for Distributed Intrusion Detection System \",World Academy of Science, Engineering and Technology, 2005 http://www.waset.org/journals/waset/v6/v6-45.pdf
[13] Vasilios A. Siris , Fotini Papagalou \"Application of anomaly detection algorithms for detecting SYN flooding attacks\", Institute of Computer Science, Hellas,2004.
[14] Allam Appa Rao, P.Srinivas, B. Chakravarthy, K.Marx, and P. Kiran \"A Java Based Network Intrusion Detection System (IDS)\", Andhra university college of engineering , India, proceeding of the 2006 IJME-INTERTECH Conference.
[15] Kalle Burbeck, \"Adaptive Real-time Anomaly Detection for Safeguarding Critical Networks\", Sweden, 2006, http://liu.diva-portal.org/smash/get/diva2:21588/FULLTEXT01
[16] Gaia Maselli , Luca Deri, Stefano Suin \"Design and Implementation of an Anomaly Detection System: an Empirical Approach\" http://luca.ntop.org/ADS.pdf
[17] Ozgur Depren, Murat Topallar, Emin Anarim, M. Kermal Ciliz, \"An intelligent intrusion detection system(IDS) for anomaly and misuse detection in computer networks\", expert systems with applications29(2005).