Dissertation > Excellent graduate degree dissertation topics show

Mobile Agent-Based Distributed Intrusion Detection System

Author: SongJiHua
Tutor: LiuWeiGuo
School: Central South University
Course: Computer technology
Keywords: Network data analysis intrusion detection mobile agent distributed system
CLC: TP393.08
Type: Master's thesis
Year: 2012
Downloads: 64
Quote: 0
Read: Download Dissertation

Abstract


Intrusion detection system (IDS) can effectively compensate for the defect of traditional security protection technology. It has become an important technology of the network safety. However, the traditional IDS based on the host or network has certain limitations such as single point failure, occupation of network bandwidth, poor collaboration and low scalability. Owning to its unique features of dynamic migration, platform independence, low network flow, distribution flexibility and high scalability, the application of mobile agent technology in IDS can make up for the deficiency of traditional IDS.After analyzing the intrusion detection technology and mobile agent technology, this paper puts forward a system model of distributed intrusion detection system based on mobile agent (DIDSMA). Three-layer-structure is included in this model:the data acquisition layer, the management layer and the control layer. The data acquisition layer is responsible for data acquisition and the preliminary analysis. The management layer is for overall data analysis tests and management of the mobile agent in the lower layer. The control layer is for the management and configuration of the whole system and the comprehensive analysis of the intrusion behavior. The agents are located in different hosts. They can both work independently and collaboratively. They can communicate with each other. Each host can have multiple agents. In this paper the main functional modules are detailed designed. With the help of packet capture tool Winpcap the network data acquisition is realized. The host data acquisition is fulfilled by the tool of dumpel owned in the Windows. The system analyzes and detects the data based on the probability statistical algorithms and mining algorithm. At the same time communication module is designed in the system, including the communication between the mobile agents in the same layer and the agent communication between upper and lower. Finally, the system is realized and tested by the aglet platform in the Windows environment. The test results show that the detection system can accurately detect the various attacks. The system takes up cyber source less and has better expansibility.

Related Dissertations

  1. Research of Fault Injection for a Distributed System,TP338.8
  2. Research of Communication Mechanism in the Distributed Network Based on Mobile Agent,TP393.02
  3. Intrusion detection based on the ultrasonic echo envelope in the military security patrols,E919
  4. The Research on Localization Algorithm of Wireless Sensor Networks,TN929.5
  5. Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust,TP212.9
  6. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  7. Research on Intrusion Detection Based on Feature Selection,TP393.08
  8. Research and Implementation of Distributed Data Integration Visual Modeling,TP311.52
  9. The Research on Intrusion Detection System Based on Machine Learning,TP393.08
  10. Research and Application of Map/Reduce Based Distributed Log Analyzer,TP311.52
  11. Design of Network Intrusion Detection System Based on FPGA,TP393.08
  12. Research of Key Technologies of Intrusion Detection Based on Computer Immune,TP393.08
  13. One based on pattern matching lightweight network intrusion detection system design and implementation,TP393.08
  14. Research on Intrusion Prevention Based on Semi-Supervised Fuzzy Clustering,TP393.08
  15. Hospital Sewage Disposal Research and Design of Distributed Control,X799.5
  16. A Study of Dynamic Workflow Based on Mobile Agent,TP311.52
  17. The Research of Network Intrusion Detection Technologybased on RBFNN-HMM,TP393.08
  18. Design and Implementation of Video Surveillance Distributed System,TP311.52
  19. Research on Application of Intrusion Detection Based on Improved FCM,TP393.08
  20. Research of Intelligent Campus Based on Pervasive Computing,TN925.93
  21. Research on Intrusion Detection Technology for Wireless Sensor Networks,TN915.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile