An architecture for intrusion detection using autonomous agents
The intrusion detection system architectures commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. The most common shortcoming in the existing architectures is that they are built around a single monolithic entity that...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 24 |
---|---|
container_issue | |
container_start_page | 13 |
container_title | |
container_volume | |
creator | Balasubramaniyan, J.S. Garcia-Fernandez, J.O. Isacoff, D. Spafford, E. Zamboni, D. |
description | The intrusion detection system architectures commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. The most common shortcoming in the existing architectures is that they are built around a single monolithic entity that does most of the data collection and processing. In this paper, we review our architecture for a distributed intrusion detection system based on multiple independent entities working collectively. We call these entities autonomous agents. This approach solves some of the problems previously mentioned. We present the motivation and description of the approach, partial results obtained from an early prototype, a discussion of design and implementation issues, and directions for future work. |
doi_str_mv | 10.1109/CSAC.1998.738563 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_738563</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>738563</ieee_id><sourcerecordid>738563</sourcerecordid><originalsourceid>FETCH-LOGICAL-i174t-bdf414eb84540765e33bb940d50c26287441bdf2f94daa53651a0ab25bc1ee143</originalsourceid><addsrcrecordid>eNotT0tLxDAYDD7A7updPOUPtObLOycpxVVhwYN6XpI2XSNuKkl68N_bZT3Ng5mBQegWSANAzH331nYNGKMbxbSQ7AxVVChZGyDsHK2IBi210oZfoAqIZLURVF2hVc5fhCw9BRV6aCO2qf8MxfdlTh6PU8IhljTnMEU8-KN_ZIuOe2znMsXpMM0Z272PJV-jy9F-Z3_zj2v0sXl8757r7evTS9du6wCKl9oNIwfuneaCEyWFZ8w5w8kgSE8l1YpzWDJ0NHywVjApwBLrqHA9eA-crdHdaTd473c_KRxs-t2dfrM_8dlKyw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An architecture for intrusion detection using autonomous agents</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Balasubramaniyan, J.S. ; Garcia-Fernandez, J.O. ; Isacoff, D. ; Spafford, E. ; Zamboni, D.</creator><creatorcontrib>Balasubramaniyan, J.S. ; Garcia-Fernandez, J.O. ; Isacoff, D. ; Spafford, E. ; Zamboni, D.</creatorcontrib><description>The intrusion detection system architectures commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. The most common shortcoming in the existing architectures is that they are built around a single monolithic entity that does most of the data collection and processing. In this paper, we review our architecture for a distributed intrusion detection system based on multiple independent entities working collectively. We call these entities autonomous agents. This approach solves some of the problems previously mentioned. We present the motivation and description of the approach, partial results obtained from an early prototype, a discussion of design and implementation issues, and directions for future work.</description><identifier>ISSN: 1063-9527</identifier><identifier>ISBN: 0818687894</identifier><identifier>ISBN: 9780818687891</identifier><identifier>EISSN: 2576-9103</identifier><identifier>DOI: 10.1109/CSAC.1998.738563</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authorization ; Autonomous agents ; Contracts ; Ear ; Event detection ; Intrusion detection ; Laboratories ; MONOS devices ; Prototypes ; Read only memory</subject><ispartof>Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), 1998, p.13-24</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/738563$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,4035,4036,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/738563$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Balasubramaniyan, J.S.</creatorcontrib><creatorcontrib>Garcia-Fernandez, J.O.</creatorcontrib><creatorcontrib>Isacoff, D.</creatorcontrib><creatorcontrib>Spafford, E.</creatorcontrib><creatorcontrib>Zamboni, D.</creatorcontrib><title>An architecture for intrusion detection using autonomous agents</title><title>Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)</title><addtitle>CSAC</addtitle><description>The intrusion detection system architectures commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. The most common shortcoming in the existing architectures is that they are built around a single monolithic entity that does most of the data collection and processing. In this paper, we review our architecture for a distributed intrusion detection system based on multiple independent entities working collectively. We call these entities autonomous agents. This approach solves some of the problems previously mentioned. We present the motivation and description of the approach, partial results obtained from an early prototype, a discussion of design and implementation issues, and directions for future work.</description><subject>Authorization</subject><subject>Autonomous agents</subject><subject>Contracts</subject><subject>Ear</subject><subject>Event detection</subject><subject>Intrusion detection</subject><subject>Laboratories</subject><subject>MONOS devices</subject><subject>Prototypes</subject><subject>Read only memory</subject><issn>1063-9527</issn><issn>2576-9103</issn><isbn>0818687894</isbn><isbn>9780818687891</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>1998</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotT0tLxDAYDD7A7updPOUPtObLOycpxVVhwYN6XpI2XSNuKkl68N_bZT3Ng5mBQegWSANAzH331nYNGKMbxbSQ7AxVVChZGyDsHK2IBi210oZfoAqIZLURVF2hVc5fhCw9BRV6aCO2qf8MxfdlTh6PU8IhljTnMEU8-KN_ZIuOe2znMsXpMM0Z272PJV-jy9F-Z3_zj2v0sXl8757r7evTS9du6wCKl9oNIwfuneaCEyWFZ8w5w8kgSE8l1YpzWDJ0NHywVjApwBLrqHA9eA-crdHdaTd473c_KRxs-t2dfrM_8dlKyw</recordid><startdate>1998</startdate><enddate>1998</enddate><creator>Balasubramaniyan, J.S.</creator><creator>Garcia-Fernandez, J.O.</creator><creator>Isacoff, D.</creator><creator>Spafford, E.</creator><creator>Zamboni, D.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>1998</creationdate><title>An architecture for intrusion detection using autonomous agents</title><author>Balasubramaniyan, J.S. ; Garcia-Fernandez, J.O. ; Isacoff, D. ; Spafford, E. ; Zamboni, D.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i174t-bdf414eb84540765e33bb940d50c26287441bdf2f94daa53651a0ab25bc1ee143</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>1998</creationdate><topic>Authorization</topic><topic>Autonomous agents</topic><topic>Contracts</topic><topic>Ear</topic><topic>Event detection</topic><topic>Intrusion detection</topic><topic>Laboratories</topic><topic>MONOS devices</topic><topic>Prototypes</topic><topic>Read only memory</topic><toplevel>online_resources</toplevel><creatorcontrib>Balasubramaniyan, J.S.</creatorcontrib><creatorcontrib>Garcia-Fernandez, J.O.</creatorcontrib><creatorcontrib>Isacoff, D.</creatorcontrib><creatorcontrib>Spafford, E.</creatorcontrib><creatorcontrib>Zamboni, D.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Balasubramaniyan, J.S.</au><au>Garcia-Fernandez, J.O.</au><au>Isacoff, D.</au><au>Spafford, E.</au><au>Zamboni, D.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An architecture for intrusion detection using autonomous agents</atitle><btitle>Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)</btitle><stitle>CSAC</stitle><date>1998</date><risdate>1998</risdate><spage>13</spage><epage>24</epage><pages>13-24</pages><issn>1063-9527</issn><eissn>2576-9103</eissn><isbn>0818687894</isbn><isbn>9780818687891</isbn><abstract>The intrusion detection system architectures commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. The most common shortcoming in the existing architectures is that they are built around a single monolithic entity that does most of the data collection and processing. In this paper, we review our architecture for a distributed intrusion detection system based on multiple independent entities working collectively. We call these entities autonomous agents. This approach solves some of the problems previously mentioned. We present the motivation and description of the approach, partial results obtained from an early prototype, a discussion of design and implementation issues, and directions for future work.</abstract><pub>IEEE</pub><doi>10.1109/CSAC.1998.738563</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1063-9527 |
ispartof | Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), 1998, p.13-24 |
issn | 1063-9527 2576-9103 |
language | eng |
recordid | cdi_ieee_primary_738563 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authorization Autonomous agents Contracts Ear Event detection Intrusion detection Laboratories MONOS devices Prototypes Read only memory |
title | An architecture for intrusion detection using autonomous agents |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T12%3A26%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20architecture%20for%20intrusion%20detection%20using%20autonomous%20agents&rft.btitle=Proceedings%2014th%20Annual%20Computer%20Security%20Applications%20Conference%20(Cat.%20No.98EX217)&rft.au=Balasubramaniyan,%20J.S.&rft.date=1998&rft.spage=13&rft.epage=24&rft.pages=13-24&rft.issn=1063-9527&rft.eissn=2576-9103&rft.isbn=0818687894&rft.isbn_list=9780818687891&rft_id=info:doi/10.1109/CSAC.1998.738563&rft_dat=%3Cieee_6IE%3E738563%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=738563&rfr_iscdi=true |