network. However, this behavior may be considered
as illegal. We subsequently explored another idea
based on collaborative and distributed honeynet
deployed in many universities in morocco. Those
universities play the role of our collaborator
networks. Each honeynet is targeted by many attacks
that are stored in the log file. The latter will thus
very helpful in our context to gather and analyze a
vast scope of information about attacks.
Note that a honeynet is a special kind of high-
interaction honeypot. It extends the concept of a
single honeypot to a highly controlled network of
honeypot. A honeynet is a specialized network
architecture configured in a way to achieve data
control, data capture and data collection (Mairh et al.,
2011).
Furthermore, we use agents that are inherent to
the characteristics of multi-agents system. They in
fact have the following features:
Cooperation: it means that agents work together
to solve intrusion detection task.
Coordination: The coordination of the actions of
agents ensures coherence of the system.
Delegation: it is the ability of an agent to execute
tasks for a third party.
Communication: agents must be able to
communicate with each other to cooperate and
coordinate their actions.
Effectiveness: collected data must be accurate
and represent often a malicious traffic. The agent
must be able to distinguish a malicious traffic
(representing threats) from normal traffic
(minimum of false positives).
Security: the agent must be able to communicate
with other agents and the manager. This
communication must absolutely be encrypted
and digitally signed to ensure that data will not
be listened to, on one hand, and that the manager
can ensure their authenticity and their origin on
the other hand.
To satisfy these properties, we believe that the agent
technology constitutes an interesting mechanism for
developing our distributed intrusion detection system
and offers a lot of flexibility.
3.1 Overall System Architecture
At first, given the advantages of distributed system
compared with centralized and hierarchical
architectures, we design our intrusion detection
system based on distributed detection approach. Our
system consists of two separate parts. The first one is
the network to secure which contains the manager
agent and the second one is composed of a set of
collaborator networks which deploys honeynet
platform. Basically, each collaborator network is
made up of four major components as shown in
Figure 1: sensor and three static agents cooperative
and communicating: parser agent, misuse detection
agent and anomaly detection agent. Moreover the
two networks have a local signature database.
In the following, we describe each component of
the proposed architecture:
Sensor: installed on each collaborator network, it
is able to intercept and log traffic passing over
the network. Afterwards, it saves the captured
packets in a sniffing file.
Parser agent: it is a static agent which parses data
and distinguishes the various fields of the
collected packets such as source /destination
addresses, protocol and other specific
information related to the captured packet. The
parser agent parses data from two files; (1) the
sniffing file which contains the packets already
captured by the sensor and (2) the log file
containing various actions performed by
attackers on the honeynet platform. The output
data is saved into the parsing database.
Misuse detection agent (MDA): This kind of
agent is responsible for detecting well-known
attacks. In fact, it analyses the parsed data by
matching their characteristics with those
contained in the rules stored in the signature
database. If there is a match - which means it
confirms that the attack is known, it reports it as
alerts to manager agent. The later updates its
signature database. Although the known attacks
are detected, it remains the problem of the new
attacks detection. In this context, if misuse
detection agent does not confirm that the attack is
known, which means the packets do not contain
intrusion's signature, it sends it to the anomaly
detection agent. To detect known attacks, misuse
detection agent uses snort signature database.
Snort is a free lightweight network intrusion
detection system, configured with an intrusion
signature rule set to detect known attack pattern.
Anomaly Detection Agent (ADA): It is
responsible for detecting unknown attacks.
When it detects unknown attacks, it reports it
as alert to manager agent and it updates
signature database.
Manager Agent (MA): Installed on the
network to secure, when it receives alerts from
Misuse detection agent and anomaly detection
agent, it updates its signature database.
DistributedIntrusionDetectionSystembasedonAnticipationandPredictionApproach
345