{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T07:11:18Z","timestamp":1685949078057},"reference-count":25,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1,1]]},"abstract":"<p>Security has become the Achilles\u2019 heel of many organizations in today\u2019s computer-dominated society. In this paper, a configurable intrusion detection and response framework named Mobile Agents based Distributed (MAD) security system was proposed for enterprise network consisting of a large number of mobile and handheld devices. The key idea of MAD is to use autonomous mobile agents as lightweight entities to provide unified interfaces for intrusion detection, intrusion response, information fusion, and dynamic reconfiguration. These lightweight agents can be easily installed and managed on mobile and handheld devices. The MAD framework includes a family of autonomous agents, servers and software modules. An Object-based intrusion modeling language (mLanguage) is proposed to allow easy data sharing and system control. A data fusion engine (mEngine) is used to provide fused results for traffic classification and intrusion identification. To ensure Quality-of-Service (QoS) requirements for end users, adaptive resource allocation scheme is also presented. It is hoped that this project will advance the understanding of complex, interactive, and collaborative distributed systems.<\/p>","DOI":"10.4018\/jhcr.2011010103","type":"journal-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T20:41:09Z","timestamp":1297802469000},"page":"41-54","source":"Crossref","is-referenced-by-count":0,"title":["Mobile Agent Based Network Defense System in Enterprise Network"],"prefix":"10.4018","volume":"2","author":[{"given":"Yu","family":"Cai","sequence":"first","affiliation":[{"name":"Michigan Technological University, USA"}]}],"member":"2432","reference":[{"key":"jhcr.2011010103-0","author":"B. D. O.Anderson","year":"1979","journal-title":"Optimal filtering"},{"key":"jhcr.2011010103-1","doi-asserted-by":"crossref","unstructured":"Balasubramaniyan, J., & Fernandez, G. (1998). An architecture for intrusion detection using autonomous agents. In Proceedings of the annual computer security applications conference (ACSAC).","DOI":"10.1109\/CSAC.1998.738563"},{"key":"jhcr.2011010103-2","doi-asserted-by":"publisher","DOI":"10.1145\/332051.332079"},{"key":"jhcr.2011010103-3","doi-asserted-by":"crossref","unstructured":"Cheung, S., Lindqvist, U., & Fong, M. W. (2003). Modeling multistep cyber attacks for scenario recognition. In Proceedings of the third DARPA information survivability conference and exposition.","DOI":"10.1109\/DISCEX.2003.1194892"},{"key":"jhcr.2011010103-4","doi-asserted-by":"crossref","unstructured":"Cuppens, F. (2001). Managing alerts in a multi-intrusion detection environment. In Proceedings of the 17th annual computer security applications conference.","DOI":"10.1109\/ACSAC.2001.991518"},{"key":"jhcr.2011010103-5","doi-asserted-by":"crossref","DOI":"10.1002\/0470099747","author":"C.Douligeris","year":"2007","journal-title":"Network security: Current status and future directions"},{"key":"jhcr.2011010103-6","doi-asserted-by":"crossref","unstructured":"Ferguson, N., Whiting, D., & Schneier, B. (2003). Helix: Fast encryption and authentication in a single cryptographic primitive (LNCS 2887, pp. 330-346). New York: Springer.","DOI":"10.1007\/978-3-540-39887-5_24"},{"key":"jhcr.2011010103-7","unstructured":"Gopalakrishna, R., & Spafford, E. (2004). A framework for distributed intrusion detection using interest-driven cooperating agents. In Proceedings of international symposium on recent advances in intrusion detection."},{"key":"jhcr.2011010103-8","doi-asserted-by":"crossref","DOI":"10.1201\/9781420038545","author":"D. L.Hall","year":"2001","journal-title":"Handbook of Multisensor Data Fusion"},{"key":"jhcr.2011010103-9","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950192"},{"key":"jhcr.2011010103-10","doi-asserted-by":"crossref","unstructured":"Karim, R. (2006). An Efficient Collaborative Intrusion Detection System for MANET Using Bayesian Approach. In Proceedings of the MSWiM.","DOI":"10.1145\/1164717.1164750"},{"key":"jhcr.2011010103-11","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.853547"},{"key":"jhcr.2011010103-12","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2008.42"},{"key":"jhcr.2011010103-13","doi-asserted-by":"crossref","unstructured":"Liu, Y., Comaniciu, C., & Man, H. (2006). A Bayesian Game Approach for Intrusion Detection in Wireless Ad Hoc Networks. In Proceedings of the GameNets conference.","DOI":"10.1145\/1190195.1190198"},{"key":"jhcr.2011010103-14","doi-asserted-by":"publisher","DOI":"10.1145\/996943.996947"},{"key":"jhcr.2011010103-15","doi-asserted-by":"publisher","DOI":"10.1145\/503339.503342"},{"key":"jhcr.2011010103-16","unstructured":"Porras, P., & Neumann, P. (1997). EMERALD: Event monitoring enabling responses to anomalous live disturbances. In Proceedings of the 20th NIS security conference."},{"issue":"10","key":"jhcr.2011010103-17","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3233\/JCS-2002-101-205","article-title":"Practical automated detection of stealthy portscans.","volume":"1","author":"S.Staniford","year":"2002","journal-title":"Journal of Computer Security"},{"key":"jhcr.2011010103-18","unstructured":"Tang, Y., & Chen, S. (2005). Defending against internet worms: A signature-based approach. In Proceedings of the IEEE Infocom conference."},{"key":"jhcr.2011010103-19","unstructured":"Toth, T., & Kruegel, C. (2002). Connection-history based anomaly detection. In Proceedings of the IEEE workshop on information assurance and security."},{"key":"jhcr.2011010103-20","doi-asserted-by":"crossref","unstructured":"Valdes, A., & Skinner, K. (2001). Probabilistic alert correlation. In Proceedings of the 4th international symposium on recent advances in intrusion detection.","DOI":"10.1007\/3-540-45474-8_4"},{"key":"jhcr.2011010103-21","doi-asserted-by":"publisher","DOI":"10.1109\/65.484228"},{"key":"jhcr.2011010103-22","doi-asserted-by":"crossref","unstructured":"Zhang, J., & Varadharajan, V. A. (2008). New Security Scheme for Wireless Sensor Networks. In Proceedings of the IEEE Global Telecommunications Conference.","DOI":"10.1109\/GLOCOM.2008.ECP.32"},{"key":"jhcr.2011010103-23","doi-asserted-by":"crossref","unstructured":"Zhang, Y., & Lee, W. (2000). Intrusion Detection in Wireless Ad-Hoc Networks. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking.","DOI":"10.1145\/345910.345958"},{"key":"jhcr.2011010103-24","unstructured":"Zhou, X., Cai, Y., Godavari, G. K., & Chow, C. E. (2004). An adaptive process allocation strategy for proportional responsiveness differentiation on Web servers. In Proceedings IEEE international conference on web services."}],"container-title":["International Journal of Handheld Computing Research"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=51573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T06:50:55Z","timestamp":1685947855000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jhcr.2011010103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2011,1,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"URL":"https:\/\/doi.org\/10.4018\/jhcr.2011010103","relation":{},"ISSN":["1947-9158","1947-9166"],"issn-type":[{"value":"1947-9158","type":"print"},{"value":"1947-9166","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,1]]}}}