detection, because this kind of data can only be got
from application, while the independency of
application makes an application-based user action
more difficult to acquire.
(2) Application-based detection can affect the
performance of corresponding application due to the
extra work that should be done on data generating
and analysis.
(3) A masquerader may happen to have similar
behavioral patterns as the legitimate user of an
account to which he or she is currently logged,
therefore escaping detection and successfully
causing damage under the cover of seemingly
normal behaviour ( Coull, S.; Branch, J.; Szymanski,
B.; Breimer, E., 2003).
Fortunately, There have been several attempts to
tackle the problem of detecting masqueraders.
Several masquerade-detection algorithms, such as
Sequence-Match, IPAM, Bayes 1-Step Markov, etc
are presented by Schonlau and his colleagues (M.
Schonlau, W. DuMouchel, W.-H. Ju, A. F. Karr, M.
Theus, and Y. Vardi, 2001). However, researches on
data acquiring and overall system structure have
seldom to mention. So, in this paper, we mainly
focus on these topics.
An agent-based intrusion detection system is
proposed. Being different from other agent-based
IDSs, this system can be integrated with enterprise
information system very well. The system mainly
consists of three kinds of agents: client agent, server
agent and communication agent. The system
architecture, agent structure, integration mechanism,
etc, are mainly discussed. And we explain how to
integrate agents with access control model to
achieve better security performance.
The paper is structured as follows. Section 2
describes related work and discusses previous efforts
to utilize agent techniques for intrusion detection.
Section 3 introduces our system that can be
integrated with actual application and performs
application-oriented intrusion detection. Section 4
discusses the overall system performance and design
issues. Finally, Section 5 briefly concludes.
2 RELATED WORK
Agent technology is a very active field of distributed
artificial intelligence (DAI) research in the recent
years. A software agent can be defined as (J. M.
Bradshaw,1997):
It’s a software entity that functions
continuously and autonomously in a particular
environment, and is able to carry out activities in a
flexible and intelligent manner that is responsive to
changes in the environment. Ideally, an agent that
functions continuously would be able to learn from
its experience.
Although agent may not improve the techniques
for intrusion detection directly, it can change the
means of applying detection techniques, which will
lead to high efficiency and validity of intrusion
detection. Recently, there has been an accretion of
approaches for building agent-based IDSs for
Internet applications. In such a system, agents with
differing capabilities can interact with each other to
perform data acquiring, analysis, reporting. Several
related agent-based IDSs can be listed as follows:
(1) Autonomous Agents For Intrusion Detection
(AAFID) (Balasubramaniyan, J.S.; Garcia-
Fernandez, J.O.; Isacoff, D.; Spafford, E.; Zamboni,
D., 1998)
The AAFID system consists of three essential
components: agents, transceivers and monitors.
Agents are used as the lowest-level element for data
collection. All agents in a host report their findings
to a single transceiver. However, the communication
between agents or transceivers is based on SNMP,
System V IPC, this may lead to extra work when
developing a new agent.
(2) Multi-agent based intrusion detection system
(Hegazy, I.M.; Al-Arif, T.; Fayed, Z.T.; Faheem,
H.M, 2003)
The system employs sniffing agent, analysis
agent, decision agent and report agent to detect three
kinds of attack: the Denial of Service attack, the
ping swept attack and the secure coded document
theft. It can be treated as a network-based detection
system.
(3) An intelligent agent security intrusion system
(Pikoulas, J.; Buchanan, W.; Mannion, M.;
Triantafyllopoulos, K, 2002)
The system is an application-based detection
one. It utilizes the Bayesian multivariate statistical
model to predict user action. In such a system, a user
agent resides in a user workstation, while a core
agent resides on the server. User agent monitors and
analyzes the user action according user profile file
downloaded from server via core agent. The file
contains rules that describe the legal past behavior of
the user and the statistical predictions. Therefore, the
file must be kept secure by itself, however, it’s
difficult to ensure this in this system.
Although these IDSs may be effective in
detecting some kinds of intrusion, but how to
integrate them with all kinds of application in
enterprise information system remains a difficult
problem.
AGENT-BASED INTRUSION DETECTION SYSTEM FOR INTEGRATION
177