• Jun 04, 2019 News!IJIEE Vol. 9, No. 2 issue has been published online!   [Click]
  • May 14, 2019 News!Vol.7, No.5-Vol.8, no.2 has been indexed by EI (Inspec).   [Click]
  • Apr 15, 2019 News!Papers published in Vol.8, No.1-No.4 have all received dois from Crossref.
General Information
    • ISSN: 2010-3719 (Online)
    • Abbreviated Title: Int. J. Inf. Electron. Eng.
    • Frequency: Quarterly
    • DOI: 10.18178/IJIEE
    • Editor-in-Chief: Prof. Chandratilak De Silva Liyanage
    • Executive Editor: Jennifer Zeng
    • Abstracting/ Indexing : Google Scholar, Electronic Journals Library, Crossref and ProQuest, Ei (INSPEC, IET), EBSCO.
    • E-mail ijiee@ejournal.net

University of Brunei Darussalam, Brunei Darussalam   
" It is a great honor to serve as the editor-in-chief of IJIEE. I'll work together with the editorial team. Hopefully, The value of IJIEE will be well recognized among the readers in the related field."

IJIEE 2012 Vol.2(4): 606-611 ISSN: 2010-3719
DOI: 10.7763/IJIEE.2012.V2.170

Self-Protected Mobile Agent Approach for Distributed Intrusion Detection System against DDoS Attacks

P. Marikkannu, J. J. Adri Jovin, and T. Purusothaman

Abstract—With the growing Information Systems and Network technologies, security threats over the systems have also become common. Providing a security mechanism to detect such threats has become an inevitable part of Information Systems. Distributed Denial of Service (DDoS) attack is one of the most common attacks which are done in a co-ordinated manner. Hence, we need a Distributed Intrusion Detection System to detect those attacks. We use mobile agents for the purpose of Intrusion Detection. However, these mobile agents are prone to attacks which may lead to the failure of the IDS as a whole. In this paper, we propose a system for distributed intrusion detection system against DDoS attacks. In our system, we propose two security architectures namely Isolated Trusted Environment SMADIDS and Integrated Trusted Environment SMADIDS based on the mechanism of reference clone to protect the mobile agent from being modified. We also incorporate the functionality of Protocol Analysis Method in combination with the traditional rule based IDS to enhance the Intrusion Detection and to reduce false alarm rate. From the results obtained, it was observed that the system proves to be better in its performance compared to other traditional Intrusion Detection Systems and is found to provide at most security to the Mobile Agents.

Index Terms—Distributed intrusion detection system, self-protected mobile agents, DDoS, reference clone, protocol analysis, network security.

P. Marikkannu is with the Department of Information Technology, Anna University of Technology, Coimbatore, India (e-mail: pmarikkannu@gmail.com).
J. J. Adri Jovin is with the Department of Computer Science and Engineering, Sri Guru Institute of Technology, Coimbatore India (e-mail: adrijovin@yahoo.co.in).
T. Purusothaman is with the Department of Computer Science and Information Technology, Government College of Technology, Coimbatore India (e-mail: purushgct@yahoo.com).


Cite: P. Marikkannu, J. J. Adri Jovin, and T. Purusothaman, "Self-Protected Mobile Agent Approach for Distributed Intrusion Detection System against DDoS Attacks," International Journal of Information and Electronics Engineering vol. 2, no. 4, pp. 606-611, 2012.

Copyright © 2008-2019. International Journal of Information and Electronics Engineering. All rights reserved.
E-mail: ijiee@ejournal.net