Agent Verification Protocol in Agent-based IDS

Agent-based IDS is a powerful technique used by network administrator to monitor traffic activities in their network. However, the widespread network coverage has introduced a possibility of a hacker installing unauthorized agents or fake agents secretly within the network. This is considered as a v...

Full description

Saved in:
Bibliographic Details
Main Authors: Luqmanul Hakim, Mohd Nasir, Kamaruzzaman, Seman, Madihah, Mohd Saudi
Format: Conference Paper
Language:en_US
Published: Ieee Computer Soc 2015
Online Access:http://ddms.usim.edu.my/handle/123456789/8891
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Sains Islam Malaysia
Language: en_US
id my.usim-8891
record_format dspace
spelling my.usim-88912015-08-12T01:51:23Z Agent Verification Protocol in Agent-based IDS Luqmanul Hakim, Mohd Nasir, Kamaruzzaman, Seman, Madihah, Mohd Saudi, Agent-based IDS is a powerful technique used by network administrator to monitor traffic activities in their network. However, the widespread network coverage has introduced a possibility of a hacker installing unauthorized agents or fake agents secretly within the network. This is considered as a very serious threat to the network security. This paper proposes a protocol that is used to detect the presence of a fake agent upon its installation. The technique is a combination of Elgamal encryption, Elgamal digital signature, and SHA-1 message digest function. A simple implementation was developed to test the proposed protocol. 2015-08-04T07:33:23Z 2015-08-04T07:33:23Z 2008 Conference Paper 978-0-7695-3242-4 http://ddms.usim.edu.my/handle/123456789/8891 en_US Ieee Computer Soc
institution Universiti Sains Islam Malaysia
building USIM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universit Sains Islam i Malaysia
content_source USIM Institutional Repository
url_provider http://ddms.usim.edu.my/
language en_US
description Agent-based IDS is a powerful technique used by network administrator to monitor traffic activities in their network. However, the widespread network coverage has introduced a possibility of a hacker installing unauthorized agents or fake agents secretly within the network. This is considered as a very serious threat to the network security. This paper proposes a protocol that is used to detect the presence of a fake agent upon its installation. The technique is a combination of Elgamal encryption, Elgamal digital signature, and SHA-1 message digest function. A simple implementation was developed to test the proposed protocol.
format Conference Paper
author Luqmanul Hakim, Mohd Nasir,
Kamaruzzaman, Seman,
Madihah, Mohd Saudi,
spellingShingle Luqmanul Hakim, Mohd Nasir,
Kamaruzzaman, Seman,
Madihah, Mohd Saudi,
Agent Verification Protocol in Agent-based IDS
author_facet Luqmanul Hakim, Mohd Nasir,
Kamaruzzaman, Seman,
Madihah, Mohd Saudi,
author_sort Luqmanul Hakim, Mohd Nasir,
title Agent Verification Protocol in Agent-based IDS
title_short Agent Verification Protocol in Agent-based IDS
title_full Agent Verification Protocol in Agent-based IDS
title_fullStr Agent Verification Protocol in Agent-based IDS
title_full_unstemmed Agent Verification Protocol in Agent-based IDS
title_sort agent verification protocol in agent-based ids
publisher Ieee Computer Soc
publishDate 2015
url http://ddms.usim.edu.my/handle/123456789/8891
_version_ 1645152498311233536