Agent Verification Protocol in Agent-based IDS
Agent-based IDS is a powerful technique used by network administrator to monitor traffic activities in their network. However, the widespread network coverage has introduced a possibility of a hacker installing unauthorized agents or fake agents secretly within the network. This is considered as a v...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Paper |
Language: | en_US |
Published: |
Ieee Computer Soc
2015
|
Online Access: | http://ddms.usim.edu.my/handle/123456789/8891 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Sains Islam Malaysia |
Language: | en_US |
id |
my.usim-8891 |
---|---|
record_format |
dspace |
spelling |
my.usim-88912015-08-12T01:51:23Z Agent Verification Protocol in Agent-based IDS Luqmanul Hakim, Mohd Nasir, Kamaruzzaman, Seman, Madihah, Mohd Saudi, Agent-based IDS is a powerful technique used by network administrator to monitor traffic activities in their network. However, the widespread network coverage has introduced a possibility of a hacker installing unauthorized agents or fake agents secretly within the network. This is considered as a very serious threat to the network security. This paper proposes a protocol that is used to detect the presence of a fake agent upon its installation. The technique is a combination of Elgamal encryption, Elgamal digital signature, and SHA-1 message digest function. A simple implementation was developed to test the proposed protocol. 2015-08-04T07:33:23Z 2015-08-04T07:33:23Z 2008 Conference Paper 978-0-7695-3242-4 http://ddms.usim.edu.my/handle/123456789/8891 en_US Ieee Computer Soc |
institution |
Universiti Sains Islam Malaysia |
building |
USIM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universit Sains Islam i Malaysia |
content_source |
USIM Institutional Repository |
url_provider |
http://ddms.usim.edu.my/ |
language |
en_US |
description |
Agent-based IDS is a powerful technique used by network administrator to monitor traffic activities in their network. However, the widespread network coverage has introduced a possibility of a hacker installing unauthorized agents or fake agents secretly within the network. This is considered as a very serious threat to the network security. This paper proposes a protocol that is used to detect the presence of a fake agent upon its installation. The technique is a combination of Elgamal encryption, Elgamal digital signature, and SHA-1 message digest function. A simple implementation was developed to test the proposed protocol. |
format |
Conference Paper |
author |
Luqmanul Hakim, Mohd Nasir, Kamaruzzaman, Seman, Madihah, Mohd Saudi, |
spellingShingle |
Luqmanul Hakim, Mohd Nasir, Kamaruzzaman, Seman, Madihah, Mohd Saudi, Agent Verification Protocol in Agent-based IDS |
author_facet |
Luqmanul Hakim, Mohd Nasir, Kamaruzzaman, Seman, Madihah, Mohd Saudi, |
author_sort |
Luqmanul Hakim, Mohd Nasir, |
title |
Agent Verification Protocol in Agent-based IDS |
title_short |
Agent Verification Protocol in Agent-based IDS |
title_full |
Agent Verification Protocol in Agent-based IDS |
title_fullStr |
Agent Verification Protocol in Agent-based IDS |
title_full_unstemmed |
Agent Verification Protocol in Agent-based IDS |
title_sort |
agent verification protocol in agent-based ids |
publisher |
Ieee Computer Soc |
publishDate |
2015 |
url |
http://ddms.usim.edu.my/handle/123456789/8891 |
_version_ |
1645152498311233536 |