Misuse detection system based- snortrules-JESS using multiagentsJournal: International Journal of Scientific & Technology Research (Vol.1, No. 3)
Publication Date: 2012-04-25
Authors : Asmaa Shaker Ashoor; Sharad Gore;
Page : 50-53
Keywords : Misuses detection; JESS; Snort rules; Multi-agent;
In this work we propose a novel Network Intrusion Detection Systems NIDSs architecture utilizing the misuse detection approach. This Network Intrusion Detection System architecture utilizes misuse detection agent. The proposed misuse detection agent adopts the novel framework by using Java Expert System Shell JESS and Snort rules along with the integration of multi agents. This approach achieves efficient misuse detection by detecting various types of network attacks and improves system performance. This approach introduces the framework for the network database security by implementation of a real time monitoring system using multi-agents. The NIDS uses the set of rules which defines the misuse behavior of user. This rule generation system is used based on JESS and Snort rules in order to use the rules for well known attacks and then taking the further decisions depended on multi-agents before intrusion occurs.
Other Latest Articles
Last modified: 2013-04-13 20:29:02