the Local Control Agent (LCA) that detects the pres-
ence of attacks on its operating system and the Cen-
tral Control Agent (CCA) that detects the presence of
propagated network attacks. Using LAC and CCA are
only the two of many resources that can be deployed
to increase visibility and control within a corporate
computing environment, the concept of defense in-
depth is the emphasis on using the best defensive tech-
nologies and mechanisms within your organization to
craft the appropriate security environment. This paper
suggests an architecture that employs both LAC and
CCA technologies used together to strongly influence
an organizational security posture, using both tech-
nologies in a harmony will ensure the needed tools
and the appropriate defensive techniques to combat
zero day and existing threats while also having the
visibility into internal networks and the ability to sup-
ply forensic data and trend analysis. On the future
works, we aim to develop the agents’ structures that
perform collaborated detection of composed attacks.
REFERENCES
Zimmermann., J., Ludovic., M., Christophe B. (2003). An
Improved Reference Flow Control Model for Policy-
Based Intrusion Detection. In proceedings of the 8th
European Symposium on Research in Computer Secu-
rity (ESORICS).
Prigent., N., Bidan., C., Heen. O., Durand. A., (2003). Scu-
rit des rseaux domestiques. SSTIC’03, 1er Symposium
sur la Scurit des Technologies de l’Information et de
la Communication. Rennes.
Ludovic., M., (2003). Dtection des intrusions dans les
systmes dinformation: la ncessaire prise en compte
des caractristiques du systme surveill. HDR, Univer-
sit de Rennes 1.
Michel., C., Ludovic., M., (2001). ADeLe: an Attack
Description Language for Knowledge-based Intrusion
Detection. In Proceedings of the 16th International
Conference on Information Security. KluIr.
Cuppens., F., Mige., A., (2002). Alert Correlation in a
Cooperative Intrusion Detection Framework. In IEEE
Symposium on Security and Privacy.
Ning., P., Reeves., D., (2002). Constructing Attack Scenar-
ios through Correlation of Intrusion Alerts. In CCS.
Ning., P., Reeves., D., Cui., Y., (2001). Correlating Alerts
Using Prerequisites of Intrusions. Technical Report,
TR-2001-13, North Carolina State University, Depart-
ment of Computer Science.
Ning., P., Cui., Y., Reeves., D., (2002). Analyzing Intensive
Intrusion Alerts via Correlation. In Recent Advances
in Intrusion Detection.
Nguyen., H., Choi., D., (2008). Application of Data Min-
ing to Network Intrusion Detection: Classifier Selec-
tion Model. Springer-Verlag Berlin Heidelberg, pages
399–408.
Ghosh., A., Michael., C., and Michael., S., (2000). A Real-
Time Intrusion Detection System Based on Learning
Program Behavior. Reliable Technologies, USA.
Selker., T., (1994). Coach: A teaching agent that Learns.
Communications of the ACM, Volume 37, Issue 7.,
pages 547–570.
Moreale., P., (1998). Agents on the Move. IEEE Spectrum,
pages 34–41.
Green., S., Hurst., L., Nangle., B., Cunningham., P.,
Somers., F., and Evans., R., (1997). Software Agents:
A Review. Technical report. Trinity Collega, Dublin,
Ireland.
Spafford., H., Zamboni., D., (2000). Intrusion detection us-
ing autonomous agents. Computer Networks, Volume
34, Issue 4., pages 547–570.
Jaisankar., N., Saravanan, K., Durai S., (2009). Intelligent
intrusion detection system framework using mobile
agents. International Journal of Network Security and
Its Applications (IJNSA), Volume 1, Issue 2.,
Sazzadul., M., Abdul, M., Abu Naser B., (2012). An imple-
mentation of i ntrusion detection system using genetic
algorithm. International Journal of Network Security
and Its App lications (IJNSA), Volume 4, Issue 2.,
Anderson D., Frivold T., and Valdes A.,. (1995).
Next-generation intrusion detection expert system
(NIDES): A summary. Technical Report SRI-CSL-95-
07, Computer Science Laboratory, SRI International,
Menlo Park, California.