Institutional Repository

Applying mobile agents in an immune-system-based intrusion detection system

Show simple item record

dc.contributor.advisor Venter, Lucas en
dc.contributor.author Zielinski, Marek Piotr en
dc.date.accessioned 2009-08-25T10:58:02Z
dc.date.available 2009-08-25T10:58:02Z
dc.date.issued 2009-08-25T10:58:02Z
dc.date.submitted 2004-11-30 en
dc.identifier.citation Zielinski, Marek Piotr (2009) Applying mobile agents in an immune-system-based intrusion detection system, University of South Africa, Pretoria, <http://hdl.handle.net/10500/1918> en
dc.identifier.uri http://hdl.handle.net/10500/1918
dc.description.abstract Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. In such an architecture, the root node is responsible for detecting intrusions and for issuing responses. However, an intrusion detection system (IDS) based on a hierarchical architecture has many single points of failure. For example, by disabling the root node, the intrusion-detection function of the IDS will also be disabled. To solve this problem, an IDS inspired by the human immune system is proposed. The proposed IDS has no single component that is responsible for detecting intrusions. Instead, the intrusion-detection function is divided and placed within mobile agents. Mobile agents act similarly to white blood cells of the human immune system and travel from host to host in the network to detect intrusions. The IDS is fault-tolerant because it can continue to detect intrusions even when most of its components have been disabled. en
dc.format.extent 1 online resource (118 leaves)
dc.language.iso en en
dc.subject Computer security en
dc.subject Intrusion detection system en
dc.subject Immune system en
dc.subject Mobile agent en
dc.subject Fault-tolerance en
dc.subject Anomaly detection en
dc.subject System call monitoring en
dc.subject Computer immunology en
dc.subject.ddc 005.8
dc.subject.lcsh Computer security
dc.subject.lcsh Mobile agents (Computer software)
dc.subject.lcsh Computer networks -- Security measures
dc.title Applying mobile agents in an immune-system-based intrusion detection system en
dc.type Dissertation en
dc.description.department Computer Science (School of Computing) en
dc.description.degree M. Sc. (Computer Science) en


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search UnisaIR


Browse

My Account

Statistics