Misuse detection system based- snortrules-JESS using multiagents
Journal: International Journal of Scientific & Technology Research (Vol.1, No. 3)Publication Date: 2012-04-25
Authors : Asmaa Shaker Ashoor; Sharad Gore;
Page : 50-53
Keywords : Misuses detection; JESS; Snort rules; Multi-agent;
Abstract
In this work we propose a novel Network Intrusion Detection Systems NIDSs architecture utilizing the misuse detection approach. This Network Intrusion Detection System architecture utilizes misuse detection agent. The proposed misuse detection agent adopts the novel framework by using Java Expert System Shell JESS and Snort rules along with the integration of multi agents. This approach achieves efficient misuse detection by detecting various types of network attacks and improves system performance. This approach introduces the framework for the network database security by implementation of a real time monitoring system using multi-agents. The NIDS uses the set of rules which defines the misuse behavior of user. This rule generation system is used based on JESS and Snort rules in order to use the rules for well known attacks and then taking the further decisions depended on multi-agents before intrusion occurs.
Other Latest Articles
- Optimization of Solar (PV) Home lighting in Literacy House with integration of LEDs and Social Impact in Indian Rural Society
- Studies on some selected metals of Siddheshwar reservoir at Hingoli, Maharashtra, India
- Hierarchical Automobile Communication Network using LIN Subnet with VI based Instrument Clusters and OBD-II Regulations
- A Novel Pre-processing Technique for DCT-domain Palm-print Recognition
- OPTIMIZATION OF FREE-VOLUME THEORY PARAMETERS FOR TERNARY POLYMERIC COATINGS FROM BINARY WEIGHT LOSS EXPERIMENTS
Last modified: 2013-04-13 20:29:02