Due to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So to protect the networks from attackers and the Intrusion detection technology becomes popular. There is tremendous rise in attacks on wired and wireless LAN. Therefore security of Distributed System (DS) is become serious challenge. One such serious challenge in DS security domain is detection of rogue points in network. Lot of work has been done in detection of intruders. But the solutions are not satisfactory. This paper gives the new idea for detecting rouge point using Mobile agent. Mobile agent technology is best suited for audit information retrieval which is useful for the detection of rogue points. Using Mobile agent we can fi...
The majority of the Distributed Intrusion Detection systems lack measures for providing security and...
The majority of the Distributed Intrusion Detection systems lack measures for providing security and...
A mobile agent is a software which performs an action autonomously and independently as a person or ...
Due to the rapid growth of the network application, new kinds of network attacks are emerging endles...
Abstract — The one of the most serious threats to computer security is the unauthorized intrusion in...
Intrusion Detection Systems (IDS) is defined as a component that analyses system and user op-eration...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
Abstract. Mobile agents as network computing technology has been applied to solve various parallel a...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has ...
Abstract:- DIDMA (Distributed Intrusion Detection using Mobile Agents) is a novel architecture in th...
Abstract- The Internet and computer networks are exposed to an increasing number of security threats...
This paper presents a distributed intrusion detection system (IDS), based on mobile agents, that det...
In the modern communication system for Mobile agent, where security is major issue to safe transfer ...
Mobile agents offer a new paradigm for distributed computation, but their potential benefits must be...
The majority of the Distributed Intrusion Detection systems lack measures for providing security and...
The majority of the Distributed Intrusion Detection systems lack measures for providing security and...
A mobile agent is a software which performs an action autonomously and independently as a person or ...
Due to the rapid growth of the network application, new kinds of network attacks are emerging endles...
Abstract — The one of the most serious threats to computer security is the unauthorized intrusion in...
Intrusion Detection Systems (IDS) is defined as a component that analyses system and user op-eration...
Abstract: Mobile agents are programs that travel autonomously through a computer network in order to...
Abstract. Mobile agents as network computing technology has been applied to solve various parallel a...
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is be...
As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has ...
Abstract:- DIDMA (Distributed Intrusion Detection using Mobile Agents) is a novel architecture in th...
Abstract- The Internet and computer networks are exposed to an increasing number of security threats...
This paper presents a distributed intrusion detection system (IDS), based on mobile agents, that det...
In the modern communication system for Mobile agent, where security is major issue to safe transfer ...
Mobile agents offer a new paradigm for distributed computation, but their potential benefits must be...
The majority of the Distributed Intrusion Detection systems lack measures for providing security and...
The majority of the Distributed Intrusion Detection systems lack measures for providing security and...
A mobile agent is a software which performs an action autonomously and independently as a person or ...