Mobile Agent Based Network Defense System in Enterprise Network

Mobile Agent Based Network Defense System in Enterprise Network

Yu Cai (Michigan Technological University, USA)
Copyright: © 2011 |Pages: 14
DOI: 10.4018/jhcr.2011010103
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Security has become the Achilles’ heel of many organizations in today’s computer-dominated society. In this paper, a configurable intrusion detection and response framework named Mobile Agents based Distributed (MAD) security system was proposed for enterprise network consisting of a large number of mobile and handheld devices. The key idea of MAD is to use autonomous mobile agents as lightweight entities to provide unified interfaces for intrusion detection, intrusion response, information fusion, and dynamic reconfiguration. These lightweight agents can be easily installed and managed on mobile and handheld devices. The MAD framework includes a family of autonomous agents, servers and software modules. An Object-based intrusion modeling language (mLanguage) is proposed to allow easy data sharing and system control. A data fusion engine (mEngine) is used to provide fused results for traffic classification and intrusion identification. To ensure Quality-of-Service (QoS) requirements for end users, adaptive resource allocation scheme is also presented. It is hoped that this project will advance the understanding of complex, interactive, and collaborative distributed systems.
Article Preview

Introduction

Security has become one of the most critical issues in today’s computer-dominated society. Security threats have increased in sophistication, frequency and complexity in the past couple of decades. Despite the continuous efforts from the security community, organizations are being attacked at an alarming rate nowadays. Particularly for large scale enterprise network consisting of a number of mobile and handheld devices, there is a mismatch between the level of protection that current security measures are providing and the level needed to address their actual degree of risks. The characteristics of the mobile and handheld devices make incorporating security very challenge. The constraints on mobile and handheld devices make the design and operation different from the contemporary wired networks. Security has become the Achilles’ heel of networks of all sizes.

The monitoring and surveillance of security threats in network systems are mostly done by Intrusion Detection System (IDS) (Douligeris & Serpanos, 2007). IDS are based on the principle that attacks on computer systems and networks will be noticeably different from normal activities. The job of IDS is to detect these abnormal patterns by analyzing information from different sensing sources in the network.

IDSs may be classified into host-based IDSs, network based IDSs and distributed IDSs, according to the source of audit information. Host-based IDSs get data from host audit trails; network-based IDSs collect network traffic as the data source; distributed IDSs gather audit data from multiple hosts and the network. There has been a shift from a centralized and monolithic IDS framework to a distributed one (Balasubramaniyan & Fernandez, 1998). Distributed IDSs usually include multiple sensors or agents for intrusion detection, and information fusion modules for data correlation.

However, when deploying IDSs in enterprise network with a large number of mobile and handheld devices, the IDS systems usually suffer from a number of limitations.

  • Configurability, controllability and manageability. Today’s networks are dynamic with mobile and handheld devices. IDSs need to support flexible on-demand reconfiguration and dynamic deployment of new nodes. For example, tasks like loading attack signatures at run-time, creating new detection sensors, being adaptive to changes in the environment, and detecting new attacks should be supported.

  • Interoperability. Today’s networks are heterogeneous with mobile devices from different vendors. Many IDSs are developed and operated in specific domains and environments. It is a complicated and error-prone task to integrate and coordinate multiple IDSs. Mechanisms need to be designed to support the effective integration, cooperation and collaboration of heterogeneous IDSs.

  • Scalability, extensibility and robustness. IDSs should be scalable to monitor large scale networks with limited overhead imposed. IDSs need to be lightweight to run on mobile and handheld devices. IDSs need to protect themselves from attacks. They should also be able to recover quickly from system crashes or network failure.

  • Effectiveness. IDSs suffer from the problem of high false alarm rate, including false positive and false negative. Algorithms need to be designed to produce real time, high-confidence detection results by fusing information from multiple data sources.

  • Global Coordination. Network intrusion detection and prevention should utilize both local surveillance and global coordination. Local surveillance secures a protection domain by proactively identifying and thwarting attacks. Global coordination integrates the information from different parts of the network and coordinates collective countermeasures.

Therefore, IDS involving mobile and handheld devices is similar to a standard, wired IDS, but has additional deployment requirements as well as some unique features specific to wireless network.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 8: 4 Issues (2017): 2 Released, 2 Forthcoming
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing