ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Misuse detection system based- snortrules-JESS using multiagents

Journal: International Journal of Scientific & Technology Research (Vol.1, No. 3)

Publication Date:

Authors : ; ;

Page : 50-53

Keywords : Misuses detection; JESS; Snort rules; Multi-agent;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In this work we propose a novel Network Intrusion Detection Systems NIDSs architecture utilizing the misuse detection approach. This Network Intrusion Detection System architecture utilizes misuse detection agent. The proposed misuse detection agent adopts the novel framework by using Java Expert System Shell JESS and Snort rules along with the integration of multi agents. This approach achieves efficient misuse detection by detecting various types of network attacks and improves system performance. This approach introduces the framework for the network database security by implementation of a real time monitoring system using multi-agents. The NIDS uses the set of rules which defines the misuse behavior of user. This rule generation system is used based on JESS and Snort rules in order to use the rules for well known attacks and then taking the further decisions depended on multi-agents before intrusion occurs.

Last modified: 2013-04-13 20:29:02