dc.contributor.advisor |
Venter, Lucas
|
en |
dc.contributor.author |
Zielinski, Marek Piotr
|
en |
dc.date.accessioned |
2009-08-25T10:58:02Z |
|
dc.date.available |
2009-08-25T10:58:02Z |
|
dc.date.issued |
2009-08-25T10:58:02Z |
|
dc.date.submitted |
2004-11-30 |
en |
dc.identifier.citation |
Zielinski, Marek Piotr (2009) Applying mobile agents in an immune-system-based intrusion detection system, University of South Africa, Pretoria, <http://hdl.handle.net/10500/1918> |
en |
dc.identifier.uri |
http://hdl.handle.net/10500/1918 |
|
dc.description.abstract |
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. In such an architecture, the root node is responsible for detecting intrusions and for issuing responses. However, an intrusion detection system (IDS) based on a hierarchical architecture has many single points of failure. For example, by disabling the root node, the intrusion-detection function of the IDS will also be disabled.
To solve this problem, an IDS inspired by the human immune system is proposed. The proposed IDS has no single component that is responsible for detecting intrusions. Instead, the intrusion-detection function is divided and placed within mobile agents. Mobile agents act similarly to white blood cells of the human immune system and travel from host to host in the network to detect intrusions. The IDS is fault-tolerant because it can continue to detect intrusions even when most of its components have been disabled. |
en |
dc.format.extent |
1 online resource (118 leaves) |
|
dc.language.iso |
en |
en |
dc.subject |
Computer security |
en |
dc.subject |
Intrusion detection system |
en |
dc.subject |
Immune system |
en |
dc.subject |
Mobile agent |
en |
dc.subject |
Fault-tolerance |
en |
dc.subject |
Anomaly detection |
en |
dc.subject |
System call monitoring |
en |
dc.subject |
Computer immunology |
en |
dc.subject.ddc |
005.8 |
|
dc.subject.lcsh |
Computer security |
|
dc.subject.lcsh |
Mobile agents (Computer software) |
|
dc.subject.lcsh |
Computer networks -- Security measures |
|
dc.title |
Applying mobile agents in an immune-system-based intrusion detection system |
en |
dc.type |
Dissertation |
en |
dc.description.department |
Computer Science (School of Computing) |
en |
dc.description.degree |
M. Sc. (Computer Science) |
en |