safe mobile agent system for distributed intrusion detection
#1

A safe mobile agent system for distributed intrusion detection



Abstract:-

This project have the implementation of a distributed agent architecture for intrusion detection and response in networked computers. Unlike conventional intrusion detection systems (IDS), this security system attempts to emulate mechanisms of the natural immune system using Java-based mobile software agents. These security agents monitor multiple levels (packet, process, system, and user) of networked computers to determine correlation among the observed anomalous patterns, reporting such abnormal behavior to the network administrator and/or possibly taking some action to counter a suspected security violation. The project focuses on the design aspects of such an intrusion detection system by integrating different artificial intelligence techniques and a mobile agent architecture.



Implementation of security agents monitor multiple levels Packet, Process, System, and user of networked computers to determine correlation among the observed anomalous patterns, reporting such abnormal behavior to the network administrator and/or possibly taking some action to counter a suspected security violation.

¢ Active monitoring

 Alter detection policies in response to critical events
¢ Robust
 Detect failed components and restore them without stopping the system
¢ Acceptable system performance
 Should not interfere with the normal functioning of the host.
¢ Dynamic configurability
¢ Change in configuration of software components, administrative policies
¢ Dynamic extensibility
 Addition of new monitoring functions, tools
Implementation Modules :-

1. GUI based Remote Interface Monitoring
Listing a Remote Host
Listing Mobile Agent
Display a Warning
Agent Action
Agent information


2. Designing a Remote Server Application

This module is designed for managing and controlling the agents
ï Execution of agents on the runtime. A machine that hosts incoming agents is running the Java runtime environment. This runtime must implement facilities for executing agents concurrently. Java provides the ability to run several threads on a Java runtime . Therefore, it is easy to manage several concurrent application processes (called agents) on the same runtime. When an agent needs to execute on the runtime, the runtime creates a new thread which executes the agent™s program.




ï Migration of agents between different runtimes. The second important issue when implementing a mobile agent distributed environment is agent migration. When an agent
migrates, two kinds of objects have to be transferred: classes and instances. The classes
constitute the program executed by the agent while the instances compose the execution

3. Mobile Agents
The agent learns about its environment and actions to be more effective. The agent must be able to communicate not only with the master agent at the host but with other agents, too. Through this communication, an agent can collaborate with other agents in the intention to reach its goals





4. User Authentication
Creating
Remove
Change
user key.

5. Implementing Mobile Agents

6. Agent is implemented in Agent Runtime Enviroment

Flow Chart







Software Requirements :-

Language : Java, RMI, SWING
O/S : WIN2000 Server , TCP/IP
Reply
#2
hey cn u provide me pdf files for the same..plz
Reply
#3
Heart
it's Nice !
But send me front & back end
with code if posible
Reply
#4
to get information about the topic Mobile Agent Based Distributed Intrusion Detection System full report ,ppt and related topic refer the page link bellow

http://studentbank.in/report-mobile-agen...ion-system

http://studentbank.in/report-mobile-agen...tem?page=2

http://studentbank.in/report-safe-mobile...-detection
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: food safe course in kelowna, online food safe course in, safe gaurd for blind, food safe course online alberta, safe driving using mobile phones in android, safe passwords in mobile phone using sha algorithm, mobile agent in distributed multimedia database system,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 971 14-02-2017, 03:49 PM
Last Post: jaseela123d
  SUSPICIOUS EMAIL DETECTION seminar class 11 7,935 21-04-2016, 11:16 AM
Last Post: dhanabhagya
  DATA LEAKAGE DETECTION project topics 16 13,268 31-07-2015, 02:59 PM
Last Post: seminar report asees
  An Acknowledgement-Based Approach for the Detection of routing misbehavior in MANETs mechanical engineering crazy 2 3,034 26-05-2015, 03:04 PM
Last Post: seminar report asees
  MOBILE PHONE BASED ATTENDANCE TRACKING SYSTEM seminarsonly 25 21,407 06-03-2015, 07:18 PM
Last Post: unas
  An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs electronics seminars 7 4,811 27-01-2015, 12:09 AM
Last Post: Guest
  Credit Card Fraud Detection Using Hidden Markov Models alagaddonjuan 28 21,100 04-09-2014, 11:31 PM
Last Post: Charlescic
  Mobile shop management System computer science technology 7 14,884 01-07-2014, 06:21 PM
Last Post: seminar report asees
  PARKme System - System Requirements Specification (SRS) computer topic 0 1,328 25-03-2014, 11:13 PM
Last Post: computer topic
  Digital Image Processing Techniques for the Detection and Removal of Cracks in Digiti electronics seminars 4 4,954 22-07-2013, 09:37 PM
Last Post: Guest

Forum Jump: