Research Article Open Access

Research on Security Protocol for Collaborating Mobile Agents in Network Intrusion Detection Systems

Olumide Simeon Ogunnusi1 and Shukor Abd Razak1
  • 1 Department of Computer Science, Faculty of Computing, Universiti Teknologi Malaysia, 81310, Skudai, Johor Bharu, Malaysia

Abstract

Despite the popularity of mobile agents in academic and commercial arena, the security issues associated with them have hindered their adoption on large scale distributed applications. However, researchers are making relentless effort to overcome the security impediments so that the interesting properties inherent in mobile agent application, especially in the field of intrusion detection, can be harnessed. Such properties include: adaptability, autonomous nature, low bandwidth utilization, latency eradication, mobility and intelligence. A number of protocols have been developed by researchers for different key distribution techniques to enhance their performance and to protect communicating entities against malicious attacks that can hinder their activities. However, they do not take into account the availability and fault tolerance of the protocols in case of any possible attack despite the authentication methods offered by encryption. This study therefore, proposes a fault-tolerant key distribution protocol for distributed mobile agents (communicating entities) in network intrusion detection system to facilitate hitch-free collaboration geared towards intrusive packets detection in Wireless Local Area Network (WLAN).

American Journal of Applied Sciences
Volume 10 No. 12, 2013, 1638-1647

DOI: https://doi.org/10.3844/ajassp.2013.1638.1647

Submitted On: 26 September 2013 Published On: 7 November 2013

How to Cite: Ogunnusi, O. S. & Razak, S. A. (2013). Research on Security Protocol for Collaborating Mobile Agents in Network Intrusion Detection Systems. American Journal of Applied Sciences, 10(12), 1638-1647. https://doi.org/10.3844/ajassp.2013.1638.1647

  • 3,326 Views
  • 2,846 Downloads
  • 0 Citations

Download

Keywords

  • Wireless Local Area Network
  • Fault-Tolerant
  • Mobile Agent
  • Key Distribution Protocol
  • Intrusion Detection