Font Size: a A A

Research On Migration Strategy Of Mobile Agent In Intrusion Detection System

Posted on:2008-12-20Degree:MasterType:Thesis
Country:ChinaCandidate:B ZhaoFull Text:PDF
GTID:2178360215950900Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the computer and network technology, computer security is increasingly more important. The intrusion detection is an essential component of the security architectures. But in the face of rapid updated, updated network environments and various new attack methods, to some extent, the traditional constructing method of IDS seems lack of the validity, extensibility and adaptability.Agent technology is a product of the development from object oriented technology to software intelligentization; by its appearance, it will play good roles in distributed environments in the future.the superiority of mobile agent technology is that make remote communication change into local communication, but the agent must move to destination firstly, followed by local communication. So if we introduce mobile agent technology into Intrusion Detection System, how does mobile agent move to destination with the lowest cost is the key question, it is mobile agent migration strategy.In this dissertation, we propose the system architecture of agent migration strategy knowledge base. The process of building this system is divided into two steps. The first is collecting the state information of every node in the network, and store this information in the State Information Database. Secondly, we use Genetic Algorithm to build agent migration strategy knowledge base. When agent is migrating, we combine previous agent migration experience and agent migration strategy from knowledge base as the pheromone distribution of Ant Algorithm. Then, we use Ant Algorithm to calculate the final agent migration strategy. Our approach integrates two algorithms and makes use of experience information. On one hand, it can improve the efficiency of calculation agent migration strategy. On the other hand, it makes the algorithms have learning ability. Finally, we use simulation test to evaluate the feasibility and efficiency of our approach.
Keywords/Search Tags:intrusion detection, mobile agent, migration strategy, computer network security
PDF Full Text Request
Related items