Distributed Intelligent Systems for Network Security Control

Mohamed Shili, Hamza Gharsellaoui, Dalel Kanzari

Abstract

The great number of heterogeneous interconnected operating systems gives greater access to intruders and makes it easier for malicious users to break systems security policy. Also, a single security control agent is insufficient to monitor multiple interconnected hosts and to protect distributed operating systems from hostile uses. This paper shows the ability of distributed security controller’s agents to correlate data stream from heterogeneous hosts and to trace abnormal behavior in order to protect network security. An experimental study is done to improve our proposed approach.

References

  1. Zimmermann., J., Ludovic., M., Christophe B. (2003). An Improved Reference Flow Control Model for PolicyBased Intrusion Detection. In proceedings of the 8th European Symposium on Research in Computer Security (ESORICS).
  2. Prigent., N., Bidan., C., Heen. O., Durand. A., (2003). Scurit des rseaux domestiques. SSTIC'03, 1er Symposium sur la Scurit des Technologies de l'Information et de la Communication. Rennes.
  3. Ludovic., M., (2003). Dtection des intrusions dans les systmes dinformation: la ncessaire prise en compte des caractristiques du systme surveill. HDR, Universit de Rennes 1.
  4. Michel., C., Ludovic., M., (2001). ADeLe: an Attack Description Language for Knowledge-based Intrusion Detection. In Proceedings of the 16th International Conference on Information Security. KluIr.
  5. Cuppens., F., Mige., A., (2002). Alert Correlation in a Cooperative Intrusion Detection Framework. In IEEE Symposium on Security and Privacy.
  6. Ning., P., Reeves., D., (2002). Constructing Attack Scenarios through Correlation of Intrusion Alerts. In CCS.
  7. Ning., P., Reeves., D., Cui., Y., (2001). Correlating Alerts Using Prerequisites of Intrusions. Technical Report, TR-2001-13, North Carolina State University, Department of Computer Science.
  8. Ning., P., Cui., Y., Reeves., D., (2002). Analyzing Intensive Intrusion Alerts via Correlation. In Recent Advances in Intrusion Detection.
  9. Nguyen., H., Choi., D., (2008). Application of Data Mining to Network Intrusion Detection: Classifier Selection Model. Springer-Verlag Berlin Heidelberg, pages 399-408.
  10. Ghosh., A., Michael., C., and Michael., S., (2000). A RealTime Intrusion Detection System Based on Learning Program Behavior. Reliable Technologies, USA.
  11. Selker., T., (1994). Coach: A teaching agent that Learns. Communications of the ACM, Volume 37, Issue 7., pages 547-570.
  12. Moreale., P., (1998). Agents on the Move. IEEE Spectrum, pages 34-41.
  13. Green., S., Hurst., L., Nangle., B., Cunningham., P., Somers., F., and Evans., R., (1997). Software Agents: A Review. Technical report. Trinity Collega, Dublin, Ireland.
  14. Spafford., H., Zamboni., D., (2000). Intrusion detection using autonomous agents. Computer Networks, Volume 34, Issue 4., pages 547-570.
  15. Jaisankar., N., Saravanan, K., Durai S., (2009). Intelligent intrusion detection system framework using mobile agents. International Journal of Network Security and Its Applications (IJNSA), Volume 1, Issue 2.,
  16. Sazzadul., M., Abdul, M., Abu Naser B., (2012). An implementation of i ntrusion detection system using genetic algorithm. International Journal of Network Security and Its App lications (IJNSA), Volume 4, Issue 2.,
  17. Anderson D., Frivold T., and Valdes A.,. (1995). Next-generation intrusion detection expert system (NIDES): A summary. Technical Report SRI-CSL-95- 07, Computer Science Laboratory, SRI International, Menlo Park, California.
Download


Paper Citation


in Harvard Style

Shili M., Gharsellaoui H. and Kanzari D. (2016). Distributed Intelligent Systems for Network Security Control . In Proceedings of the 11th International Joint Conference on Software Technologies - Volume 1: ICSOFT-EA, (ICSOFT 2016) ISBN 978-989-758-194-6, pages 348-352. DOI: 10.5220/0006009203480352


in Bibtex Style

@conference{icsoft-ea16,
author={Mohamed Shili and Hamza Gharsellaoui and Dalel Kanzari},
title={Distributed Intelligent Systems for Network Security Control},
booktitle={Proceedings of the 11th International Joint Conference on Software Technologies - Volume 1: ICSOFT-EA, (ICSOFT 2016)},
year={2016},
pages={348-352},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006009203480352},
isbn={978-989-758-194-6},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Joint Conference on Software Technologies - Volume 1: ICSOFT-EA, (ICSOFT 2016)
TI - Distributed Intelligent Systems for Network Security Control
SN - 978-989-758-194-6
AU - Shili M.
AU - Gharsellaoui H.
AU - Kanzari D.
PY - 2016
SP - 348
EP - 352
DO - 10.5220/0006009203480352