<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Multi-agent heterogeneous intrusion detection system?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mikulas Pataky</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Damas P. Gruska</string-name>
          <email>gruskag@fmph.uniba.sk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Applied Informatics, Faculty of Mathematics</institution>
          ,
          <addr-line>Physics and Informatics</addr-line>
          ,
          <institution>Comenius University in Bratislava</institution>
          ,
          <addr-line>Slovak Republic</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>Multi-agent heterogeneous intrusion detection system (MAHIDS) is a prototype proposed to detect untrusted and unusual network behaviour. The main contribution of the system is the integration of several anomaly detection techniques and machinery of multi-agent temporal logic with hybrid argumentation. Every detection technique is represented by featuring a speci c detection autonomous agent. In this stage, every agent determines the ow trustfulness from aggregated connection. The anomalies are used as an input for machinery of multiagent temporal logic which is represented by the logical agent. The logical agent is one of the system's advantages because it has huge capabilities for making a right decision about intrusions from detected anomalies. Another signi cant advantage of M-AHIDS is a new innovative agent { Web agent. The Web agent is capable to detect trusted host from his activity on web pages. The system M-AHIDS is based on tra c statistics in sFlow format acquired by network device with sFlow agent and is able to perform a real-time surveillance of the 10 Gb networks.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The number of users using internet and local networks is increasing every day.
As a consequence, there are many threats of trying to have an access to private
password, to data or to injure users by other ways. Fortunately, current
generation of network devices allows a real-time scraping of structured snapshots of
a tra c on the networks. This information is provided by various technologies.
Two the mostly used technologies are the NetFlow format introduced by CISCO
and the sFlow format. These technologies allow us to observe the individual
ows on the network. A ow is an unidirectional component of TCP connection
(or UDP/ICMP equivalent), de ned as a set of packets with identical source
and destination IP addresses, ports and protocol, packed size, MAC addresses,
switch ports, ags and more.</p>
      <p>
        An information provided by NetFlow or sFlow can be used to detect a
network attack. The most frequent attacks on networks can be divided to three
main classes [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]: Breaks privacy rules, compromising the information con
dentiality; Alters information, compromising the data integrity; Denial of
? This work was supported by the grants VEGA 1/1333/12 and UK/241/2014.
service attacks (DOS or DDOS attacks), which make a network infrastructure
unavailable or unreliable, compromising the availability of a resource.
      </p>
      <p>The protection of networks is, therefore, more than useful, if it is vital for
long time. This problem requires the monitoring of real distributed hosts, the
various events and exchanges between these hosts. It is necessary to use MAS
due to the complexity of this problems.</p>
      <p>
        The aim of this paper is to propose a multi-agent system for network intrusion
detection M-AHIDS. The main contribution of the M-AHIDS is the integration
of several anomaly detection techniques and machinery of multi-agent
temporal logic with hybrid negotiation. Every detection technique is represented by
featuring a speci c detection autonomous agent and every agent determines the
ow trustworthiness from aggregated connection. We took an inspiration for our
agents in project CAMNEP [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. All CAMNEP agents are more less separate
IDS and the project CAMNEP tries to connect their results to more trustworthy
result. But we have decided to use another approach in our IDS. Our agents are
as simple as possible. In addition to that, we have a developed new innovative
agent { Web agent which is a signi cant advantage of our system. The Web
agent is able to detect a trustworthy host from his activity on the web pages and
this is based on our past project [4{6] about de-anonymization of an Internet
user. This project is still deployed on all web pages of Comenius University and
we can detect ordinary users' behaviour from its data.
      </p>
      <p>We have used another new approach for making decisions about intrusion
from detection agent's knowledge base. For this propose we have used speci cally
developed multi-agent temporal logic (MTL). The anomalies are used as an input
for machinery of MTL which is represented by a logical agent. The logical agent
is one of the system advantages because it has huge capabilities for making a
right decision about the intrusions from detected anomalies. MTL allows us to
collect knowledge from every detection agent from past to future. All detected
intrusions are our past states in MTL and for the future states we will use the
prediction methods from past and actual connections collection.</p>
      <p>The most important contributions of our research presented in this paper
are: Integration of the several anomaly detection techniques in a form of agent;
Machinery of the multi-agent temporal logic; Hybrid negotiation with
argumentation and immune cell inspiration; New innovative detection agent { Web agent
which is able to detect a trustworthy host from his activity on the web pages.
M-AHIDS is partially implemented and tested on our Department of Applied
Informatics. Obtained results of M-AHIDS are comparable to another IDS.</p>
      <p>The organization of the paper is as follows: in section 2 { overview of the
existing solutions and approaches which we use; in section 3 { proposal of a
detection system architecture; in section 4 { detailed description of all agents
in M-AHIDS; in section 5 { overview of case study, tests and results.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Intrusion detection systems</title>
      <p>
        Intrusion Detection System or IDS is software, hardware or combination of both
used to detect an intruder's activity. The base characteristics of IDS [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] are
neutralizing illegal intrusion attempts in real time. For this reason it must be
executed constantly in a host or in a network.
      </p>
      <p>
        There are many IDS. Each of them has some advantage and disadvantage.
Their strengths or weaknesses depend mostly on how they recognizes the threats.
Two main approaches for detection intrusion are [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]:
Behavior-based intrusion detection approach, which discovers intrusive
activity by a comparing a user's or a system's behaviour with a normal behaviour
pro le;
Knowledge-based (signature-based) intrusion detection approach, which
detects intrusions upon a comparison between the parameters of the users'
session and the known pattern attacks stored in a database.
      </p>
      <p>An advantage of behaviour-based IDS is an ability to detect new form of
intrusion, but their disadvantage is a possibility of un-detection of small intrusion
or intrusion hidden in normal behaviour. On the another side knowledge-based
IDS has an advantage in low false-positive alert for well known intrusion and
high success rate for this intrusion. Their disadvantage is a low probability of
detection of new intrusion.</p>
      <p>
        One of the best known knowledge-base IDS is Snort [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Snort is an open
source IDS available to general public. Architecture of Snort is logically divided
into multiple components. These components work together to detect particular
attacks and to generate output in a required format from the detection system.
A Snort-based IDS consists of the following major components: Packet Decoder,
Preprocessors, Detection Engine, Logging and Alerting System and Output
Modules. Snort uses rules stored in text the les that can be modi ed by a text
editor. Finding signatures and using them in rules is a tricky job, since more
rules you use, more processing power is required to process captured data in real
time.
      </p>
      <p>
        There are several behaviour-based IDS. One of the most complex solution
is CAMNEP[
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. This project is based on trust models of network ows which
is built from trustfulness values of individual ows from all agents. CAMNEP
uses ve type of detection agent. Each of these agent has di erent methodology
of intrusion detection and all these agents are in core separate IDS. Authors of
CAMNEP named this agents as: Lakhina Entropy agent [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], Lakhina
Volume agent [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], MINDS agent [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], TAPS agent [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and XU agent [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. All
of these agents use the same NetFlow protocol and all agents have capability to
decide if a connection is intrusion or not. These agents are more less separate
IDS and project CAMNEP tries to connect their result to more trustworthy
result. We have decided to use another approach in our IDS. Our agents are as
simple as can be.
      </p>
      <p>One agent covers only one intrusion detection method and every agent
separately evaluates every connection. Evaluating of connection means that agent
compute score for the connection. Higher score indicates more suspicion
behaviour. We have achieved more e ective structure with this approach, because
we don't have redundant computation. Another positive e ect of this approach
is that we know exactly how well which agent evaluates every connection.</p>
      <p>
        Di erent interesting IDS for our research is the Multi-Agents Immune
System for Network Intrusions detection (MAISId) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Biological inspiration is
very useful for many scienti c departments. Inspiration in this case is biological
immune cell. Immune cells have membrane receivers, who allow them to
recognize speci cally an epitope of an antigen [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The immune system is mainly
founded on three elements: gene database of genes, negative selection and the
clonal selection. The gene database makes it possible to generate antibodies. The
negative selection makes it possible to remove the inappropriate antibodies, and
the clonal selection makes it possible to keep the best antibodies to make cells
memories of them. These three processes are independent; they are subjected to
no central body to manage them.
      </p>
      <p>MAISId is a system that performs frames analyses by a group of immune
agents collaboration. These agents are distributed on the network to achieve
simultaneous treatments, and are auto-adaptable to the evolution of the
environment and have also the property of communication and coordination in order
to ensure a good detection of intrusions in a distributed network.</p>
      <p>An advantage of this approach is that MAISId can generate many di erent
patterns to recognise intrusion in network ow. A disadvantage is a possibility
that the system throws away a pattern which can be useful in the future.</p>
      <p>A biological inspiration from MAISId was useful also in our M-AHIDS. We
have used the idea of the biological immune cells in two cases. The rst case of
application is in the middle between the evaluation score from detection agent and
the multi-agent temporal logic in logical agent. The second case of application
is during negotiation among agents. The negotiation approaches are described
bellow in this section. M-AHIDS has not created new agents for intrusion
detection yet, but we are rating successfulness of our agent. This rating in uences
weights in logical agent, which nally makes decision about the connection.</p>
      <p>
        There are two major inconveniences of the existing IDS [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. The rst one is
their di culties to adapt oneself to the changes of the network architecture
and especially how to integrate these modi cations in the detection methods.
The second one is their high rate of false-positives (false alert).
      </p>
      <p>
        On the another side the intrusion detection system is e ective if it has the
following characteristics [
        <xref ref-type="bibr" rid="ref1 ref15">15, 1</xref>
        ]: Distribution { to ensure the monitoring in
various nodes of the network the analysis task must be distributed. Autonomy {
for a fast analysis, distributed entities must be autonomous at the host level.
Delegation { each autonomous entity must be able to carry out its new tasks
in a dynamical way. Communication and cooperation { complexity of the
coordinated attacks requires a correlation of several analyses carried out in
network nodes. Reactivity { intrusion detection major goal is to react quickly to
an intrusion. Adaptability { an intrusions detection system must be open to
all network architecture changes.
      </p>
      <p>
        The negotiation is essential in settings where autonomous agents have
con icting interests and a desire to cooperate. For this reason, a mechanisms
in which the agents exchange the potential agreements according to the various
rules of interaction which have become very popular in recent years as evident,
for example, in the auction and mechanism design community[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. We use
negotiation for nally deciding in M-AHIDS which connection is intrusion and which
is normal.
      </p>
      <p>There are basically 3 type of negotiation: Heuristic, Game-theoretic and
Argumentation.</p>
      <p>
        The heuristic-base approach can be a model for multi-issue negotiation
under time constraints in an incomplete information setting. An important
property of this model is the existence of a unique equilibrium [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Another solution
[
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] uses approximating the rational choice of negotiation strategies with the use
of decision functions. PhD thesis [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] describes lot of heuristic-base approaches
and other approaches used for negotiation.
      </p>
      <p>
        The game-theoretic approach for negotiation can be used in an auction
[
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], where the seller wants to sell the items and to get the highest possible
payments for them while every bidder wants to acquire the items at the
lowest possible price. Authors of paper [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] use mathematical model of the network
security domain. This concrete method is used for IDS and provides the
mathematical formulation for the two persons security game between the defender
and the attacker. Another similar approach is trust-based solution for robust
self-con guration of distributed intrusion detection systems from [
        <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
        ] is
dened as a game-theoretical frame-work suitable for the collaboration of multiple
heterogeneous IDS systems and it introduces a simple e ective game solution
concept -FIRE.
      </p>
      <p>
        The argumentation as negotiation is the most interesting approach for our
M-AHIDS. Argumentation works by constructing series of logical steps
(arguments) for and against propositions of interest and as such may be seen as an
extension of classical logic [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. In classical logic, an argument is a sequence of
inferences leading to a true conclusion. In argumentation system arguments can
be not only a proof that propositions are true or false, but also a suggestion that
propositions might be true or false. The strength of such suggestion is
ascertained by examining the propositions used in the relevant arguments. This form
of argumentation may be seen as a formalisation of work on informal logic and
argumentation in philosophy, though it should be stressed that it was developed
independently.
      </p>
      <p>
        A formal mental model of the agents based on minimal-structure of possible
worlds (time lines) has been developed using modal operators for beliefs,
desires, intentions and goals having an appropriate set of properties in [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. This
approach was an inspiration for our argumentation and for a logical machinery
implemented in the logical agent. Our solution is describe in the next section
4.3.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>M-AHIDS</title>
      <p>Diagram of M-AHIDS is shown in gure 2. M-AHIDS is based on Microsoft .net
4.5 framework and multi-vendor sampling technology sFlow. It originally runs on
Microsoft server 2012. However, it can run also on Linux base operation system
with mono project. M-AHIDS is implemented as multi-thread application which
uses sFlow for receiving sFlow UDP datagrams.
3.1</p>
      <p>
        sFlow
sFlow is a multi-vendor sampling technology embedded within switches and
routers. It provides the ability to continuously monitor application level
trafc ows at wire speed on all interfaces simultaneously. sFlow monitoring of
high-speed, routed and switched networks has the following properties [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]:
Accurate, Detailed, Scalable, Low Cost and Timely
      </p>
      <p>M-AHIDS save approximately 10 minute window of received sFlow
datagrams in SQLlite in-memory database. This technology of in-memory database
enables to analyse a lot of received data very quickly. All detection agents work
with this database and it is also an input to logical agent.
3.2</p>
      <sec id="sec-3-1">
        <title>System layers</title>
        <p>M-AHIDS network intrusion detection system is made as four layer system.</p>
        <p>The rst layer contains in our case network 10Gb switch with sFlow agent.
Switch can be replaced with another network device with sFlow agent. sFlow
agent sends sFlow datagram to our IDS, which is also the sFlow collector.</p>
        <p>The second layer contains sFlowTool and pre-processing agent. sFlowTool
receives sFlow UDP datagrams. M-AHIDS reads encoded result from sFlowTool
and important data saves to in-memory database. Nowadays we use these
information from sFlow: `srcIP`, `dstIP`, `srcMAC`, `dstMAC`, `srcPort`, `dstPort`,
`IPProtocol`, `sampledPacketSize`, `UDPBytes`, `TCPFlags`, `inPort`, `outPort`
and `time`.</p>
        <p>The third layer contains the detection agents. Every agent is implemented
as an autonomy thread. The number of the actually active agents depends on
the number of the cores in computer processor.</p>
        <p>The forth layer contains logical agent, database with results and front-end
for network administrator, which admin can use to correct the results.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Agents</title>
      <p>
        As we mentioned in section 2, we have taken an inspiration for our agent in the
project CAMNEP [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. However, there are two main di erences: We have built
the agents di erently and we have a logical agent to complete the nal decisions.
4.1
      </p>
      <sec id="sec-4-1">
        <title>Pre-processing agent</title>
        <p>The rst step after IDS receive sFlow datagram is pre-processing as can be seen
on gure 2. For covering this function we implement a pre-processing agent. Our
IDS is designed for a huge network tra c on 10Gb switch. For this reason, we
must do some quick decisions, which connections are interesting (connection has
www….uniba.sk
&lt;iframe&gt; with scripts</p>
        <p>PHP script
JavaScripts
Generation of
web links for
history
detection</p>
        <p>Col ected
based
fingerprint
Java Applet for
Java version
FlashScript
for font
detection</p>
        <p>CSS</p>
        <p>De-anonymization
database</p>
        <p>Ajax
Save history
to SESSION
n
iitcauno
m
m
tcuoO
Network
switch
with
sFlow</p>
        <p>Network
administrator</p>
        <p>Disk storage
result
database
sFlow
tool</p>
        <p>Cycle
Inmemory
database</p>
        <p>Preprocessing
n
iitccaunnoomm De-adnaotnaybmasizeation
I</p>
        <p>Detection
agent 1</p>
        <p>Detection
agent 2</p>
        <p>Detection
agent n
Logical
decision
agent
In-memory
database
probability of being a intrusion). Like the other mentioned IDS we do this with
several rules. The rules de ne which source, destination, port and protocol or
they combination are OK and they are not interesting for the detection agents.
Administrator of network can de ne and edit these rules.
4.2</p>
      </sec>
      <sec id="sec-4-2">
        <title>Detection agents DA</title>
        <p>Nowadays we have tested 5 types of intrusion detection agents. Two of these
agents have arguments suitable for speci cation. Using this, we get 11 intruder
detection agents. Every detection agent evaluate every connection from
preprocessing agent. This evaluation is a integer number. Higher number means
more unusual behaviour.</p>
        <p>Average agent computes average number of connections with same
property (dscIP, srcIP, dscPort, srcPort).</p>
        <p>Volume agent counts number of the connections which have a same
property and which are connected to the connections which have another same
property. Concretely, we map with this method srcIP to dstIP, dstIP to srcIP, srcIP
to dstPort and dstIP to srcPort. All of these mappings are provided by separate
agents, which are running parallelly.</p>
        <p>Cluster agent is the most computationally hard agent. This agent computes
normalization distance between each of the connections. Agents use dscIP, srcIP,
dscPort, srcPort, dstMac, srcMac for distance computations.</p>
        <p>Web agent is one of our new contribution for this area of research. Web
agent uses the database of university web page's visitors and it compares IP
address of web page visitor and IP address form sFlow. If IP address is in both
databases, we can decide if behind connection there is some system or a real
user and then we can determine intrusion score for the connection. To determine
the connection, the visited pages are analysed. If web pages are systematically
visited page by page, then this is done with high probability by some system.
If same page is visited more than once in short time, then the visitor was with
high probability a real human user. We have database of university web page
visitors from our Internet users anonymity research [4{6].</p>
        <p>Entropy agent captures degree of di usion or gathering of distribution of
connection properties. This detection method is based on equation:</p>
        <p>H(X) = PiN=1( nSi )log2( nSi )
where S = PN</p>
        <p>i=1 ni and X is set of connection properties X = fn1; :::; nN g.
4.3</p>
      </sec>
      <sec id="sec-4-3">
        <title>Logical agent LA</title>
        <p>Logical agent makes nal decision about every connection and if this agent
decides that this connection is intrusion, then agent inserts this connection to
result disk storage database. Our logical agent is based on Multi-agent
Temporal Logic MTL which we mentioned in section 2 and which we describe in
subsubsection MTL in M-AHIDS below. This logic is developed especially for
needs of M-AHIDS. The past states in MTL are from previous results, which are
saved in permanent database. The future states will be computed by time series
and Fourier transform. These future states are not implemented yet.</p>
        <p>Logical agent has 3 important tasks. The rst is to build knowledge base from
results of detection agent. In this stage, LA normalizes the results to real numbers
from interval h0; 1i. Normalization uses network administrator's corrections and
immune inspiration for updating DA trust weights. Trust weights are also real
numbers from interval h0; 1i. Higher number means more trust for the agent.</p>
        <p>After normalization, LA uses argumentation framework to negotiate nal
decision { which connections are intrusions. We describe our argumentation
framework in subsubsection Argumentation framework below. The last task for
LA is to save results to permanently database.</p>
        <p>MTL in M-AHIDS is one of the modal logics. Naturally, there are many
approaches of how to build logical agents but we have decided for the
multiagent temporal logic (MTL). We have chosen this logic, because it allows as to
compare every detection agent in time. This property of the MTL we use to
decide, which connections are nally the intrusion.</p>
        <p>We de ne simple logic syntax because nowadays we use only small subset
of possible power of MTL. There are many reasons for this choice. One of the
most signi cant is real time running of computationally hard problems in IDS.
However, it is strength enough for making correct nal decisions. Syntax of logic
where is logic formula and p 2 prop is:
' ::= &gt; j ?
' ::= p j :'
::= Fi' j Gi' j Pi'j Hi'
::= FA' j GA' j PA'j HA'
Connectors Fi; Gi; Pi and Hi are temporal connectors for one agent ai 2 A and
FA; GA; PA and HA are connectors for all agents. For every judge connection
there is one atomic formula p which acts in M-AHIDS as a connection with
normal behaviour.
hM; s; ii j= &gt; allways true
hM; s; ii 2 ? never true
hM; s; ii j= p i p 2 V (s)
hM; s; ii j= :' i hM; si 2 '
hM; s; ii j= Fi' i 9s0(s i s0) : hM; s0; ii j= '
hM; s; ii j= Gi' i 8s0(s i s0) : hM; s0; ii j= '
hM; s; ii j= Pi' i 9s0(s0 i s) : hM; s0; ii j= '
hM; s; ii j= Hi' i 8s0(s0 i s) : hM; s0; ii j= '
hM; si j= FA' i 8i(ai 2 A) : hM; s0; ii j= Fi'
hM; si j= GA' i 8i(ai 2 A) : hM; s0; ii j= Gi'
hM; si j= PA' i 8i(ai 2 A) : hM; s0; ii j= Pi'
hM; si j= HA' i 8i(ai 2 A) : hM; s0; ii j= Hi'</p>
        <p>We de ne the model of MTL logic as triple M = hS A; f i: ai 2 Ag; V i,
where:
{ S = fs1; s2; :::g is non-empty set of states
{ A = fa1; a2; :::g is non-empty set of agents
{ i S S is binary relation of pair (s; s0), which speci es from which state
s can agent ai go to state s0.
{ V : S A ! }(prop) is evaluating function. Function sets for every pair
(s; a) 2 S A, which atomic formula p 2 prop is true. This function re ects
result of the DA and it uses value weight of the DA for encoding agent's
normalise result in real number to boolean.</p>
        <p>Semantic of connectors is shown in table 1.</p>
        <p>The argumentation framework is one of the approaches for negotiation
amongst agents. Nowadays, we use only very tiny framework which is de nitely
not complete because the intrusion detection is very computationally hard and
M-AHIDS must work parallel with network operation. But we are still optimizing
it and we will also extend this argumentation framework.</p>
        <p>The base of our argumentation is the binary relation 7 !. 7 ! 0 means
that is stronger than 0. The logical formulas and 0 belong to 7 ! i both
contain same the atomic formula p with a opposite value. That means that the
two DAs have contradictorily results about trust of same the connection. For
solving this contradiction we use this rules: Xi' : w 7 ! Xj ' : w0, Hi 7 ! Pj ,
Gi 7 ! Fj and if XA' then ' where X 2 fF; G; P; Hg and agent weights w &gt; w0.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Case study</title>
      <p>We have implemented M-AHIDS button up using several iterations, because the
most important requirement on IDS is real time detection. After each iteration
we did performance test and optimization. Nowadays we have the proposed
intrusion detection system M-AHIDS partially implemented .</p>
      <p>M-AHIDS is now running on sever based on Intel i7-4770S, 2x8GB 1600MHz
DDR3 CL10 DIMM RAM, 1TB HDD and OS Windows 2012 server. sFlow agent
is runnig on switch Zyxel GS1910-24.</p>
      <p>We did not make a long time test, because the M-AHIDS is still in
implementing and developing stage. However, we did some tests. During these tests,
the system was supervised and it learnt usual network behaviour. After three
day of learning we tested system for some attack as DOS, DDOS, Port Scans,
BitTorrents (there are usually unwanted in department network) and Malwares.</p>
      <p>In the gure 3 detection of port scan anomaly can be seen . The SrcIP
gure shows the relation between the number of unique source IP address and the
number of all source IP address in time. The DstPort gure shows the relation
between the number of unique destination ports and the number of all
destination ports. Red point highlights time when anomaly was executed. In the next
gure 4 exploit cluster pro le can be seen, because the most of the connections
are located in two clusters with the small diameter. This gure shows partial
(just 3 dimension space) result from cluster agent.</p>
      <p>The table 2 shows a false positive rate of the agents. We tested M-AHIDS
during usual week network operation. Every anomaly was sent 100 times and
with these anomalies we sent same number of connections with similar properties
as sent anomalies. During these tests we got 3 percent false negative detections.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>In this paper we have presented a proposal of a system for detection intrusions
in a network. The most important system features of developed and partially
implemented M-AHIDS are integration of the several anomaly detection
techniques in a form of agent, machinery of a multi-agent temporal logic, hybrid
negotiation with argumentation and immune cell inspiration and last but not
least new innovative Web agent which is able to detect trustworthy host from
his activity on web pages. This agent is based on our previous research which is
deployed on all web pages of Comenius University for one and half year.</p>
      <p>
        When we set the system to pass about 3 percent false negatives in the
normal connections then we got 36 percent false positives in malicious connections,
what is satisfaction result because project CAMNEP [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] has with 1 percent false
negatives in the normal connections 40 percent false positives in malicious.
      </p>
      <p>M-AHIDS is still in developing state. However, we have implemented the
most of the presented features of M-AHIDS. Only one important feature we
have not implemented yet { prediction of a normal network behaviour from the
collected data.</p>
      <p>As a next step we would like to implement the rest of the features to
MAHIDS, to optimize the already implemented features and to provide more and
longer tests.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Boudaoud</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Labiod</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guessoum</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boutaba</surname>
          </string-name>
          , R.:
          <article-title>Network security management with intelligent agents</article-title>
          .
          <source>In: NOMS</source>
          <year>2000</year>
          ,
          <article-title>IEEE/IFIP Network Operations</article-title>
          and
          <string-name>
            <given-names>Management</given-names>
            <surname>Symposium</surname>
          </string-name>
          ,
          <fpage>08</fpage>
          -
          <lpage>14</lpage>
          avril
          <year>2000</year>
          , Honolulu, Hawaii, Honolulu,
          <string-name>
            <surname>UNITED STATES</surname>
          </string-name>
          (
          <year>04 2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Rehak</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pechoucek</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bartos</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grill</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Celeda</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krmicek</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Camnep: An intrusion detection system for high-speed networks</article-title>
          .
          <source>Progress in Informatics</source>
          <volume>5</volume>
          (
          <issue>5</issue>
          ) (
          <year>March 2008</year>
          )
          <volume>65</volume>
          {
          <fpage>74</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Rehak</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pechoucek</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grill</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stiborek</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bartos</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Celeda</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Adaptive multiagent system for network tra c monitoring</article-title>
          .
          <source>IEEE Intelligent Systems</source>
          <volume>24</volume>
          (
          <issue>3</issue>
          ) (
          <year>2009</year>
          )
          <volume>16</volume>
          {
          <fpage>25</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Pataky</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The anonymity of the internet user</article-title>
          .
          <source>In: Proceedings of the Scienti c Conference of Technology and Innovation Processes</source>
          <year>2013</year>
          ,
          <string-name>
            <given-names>Hradec</given-names>
            <surname>Kralove</surname>
          </string-name>
          ,
          <string-name>
            <surname>CZ</surname>
          </string-name>
          , MAGNANIMITAS (
          <year>2013</year>
          )
          <volume>35</volume>
          {
          <fpage>41</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Pataky</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Anonymita pouz vatela v internete</article-title>
          .
          <source>In: ITAT</source>
          <year>2013</year>
          :
          <article-title>Information TechnologiesApplications</article-title>
          and Theory Proceedings, CreateSpace Independent Publishing Platform (
          <year>2013</year>
          )
          <volume>18</volume>
          {
          <fpage>23</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Pataky</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>De-anonymization of an internet user based on his web browser</article-title>
          .
          <source>In: CER Comparative European Research 2014 Proceedings, London, Sciemcee Publishing</source>
          (
          <year>2014</year>
          )
          <volume>125</volume>
          {
          <fpage>128</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Benyettou</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Benyettou</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rodin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berrouiguet</surname>
          </string-name>
          , S.Y.:
          <article-title>The multi-agents immune system for network intrusions detection (MAISID)</article-title>
          .
          <source>Oriental Journal Of Computer Science &amp; Technology</source>
          <volume>6</volume>
          (
          <issue>4</issue>
          ) (
          <year>December 2013</year>
          )
          <volume>383</volume>
          {
          <fpage>390</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Rehman</surname>
          </string-name>
          , R.U.:
          <article-title>Intrusion Detection Systems with Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID</article-title>
          . Prentice
          <string-name>
            <surname>Hall</surname>
            <given-names>PTR</given-names>
          </string-name>
          , Upper Saddle River, New Jersey 07458,
          <string-name>
            <surname>USA</surname>
          </string-name>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Lakhina</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Crovella</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Diot</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Mining anomalies using tra c feature distributions</article-title>
          .
          <source>SIGCOMM Comput. Commun. Rev</source>
          .
          <volume>35</volume>
          (
          <year>August 2005</year>
          )
          <volume>217</volume>
          {
          <fpage>228</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Lakhina</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Crovella</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Diot</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Diagnosing network-wide tra c anomalies</article-title>
          .
          <source>SIGCOMM Comput. Commun. Rev</source>
          .
          <volume>34</volume>
          (
          <year>August 2004</year>
          )
          <volume>219</volume>
          {
          <fpage>230</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. Ertoz, L.,
          <string-name>
            <surname>Eilertson</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lazarevic</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tan</surname>
            ,
            <given-names>P.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srivastava</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dokas</surname>
          </string-name>
          , P.: 3. In: MINDS -
          <article-title>Minnesota Intrusion Detection System</article-title>
          . MIT Press (
          <year>2004</year>
          )
          <fpage>21</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Sridharan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ye</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Tracking port scanners on the ip backbone</article-title>
          .
          <source>In: Proceedings of the 2007 workshop on Large scale attack defense. LSAD '07</source>
          , New York, NY, USA, ACM (
          <year>2007</year>
          )
          <volume>137</volume>
          {
          <fpage>144</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>Z.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bhattacharyya</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Reducing unwanted tra c in a backbone network. In: Proceedings of the Steps to Reducing Unwanted Tra c on the Internet on Steps to Reducing Unwanted Tra c on the Internet Workshop</article-title>
          , Berkeley, CA, USA, USENIX Association (
          <year>2005</year>
          ) 2{
          <fpage>2</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Majorczyk</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Totel</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Me</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Experiments on cots diversity as an intrusion detection and tolerance mechanism</article-title>
          .
          <source>In: Workshop on Recent Advances on IntrusionTolerant Systems (WRAITS)</source>
          .
          <source>(March</source>
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Boudaoud</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guessoum</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>A multi-agents system for network security management</article-title>
          .
          <source>In: SMARTNET</source>
          <year>2000</year>
          ,
          <source>6th IFIP Conference on Intelligence in Networks, September 18-22</source>
          ,
          <year>2000</year>
          , Vienna, Austria, Vienna, AUSTRIA (09
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Rahwan</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ramchurn</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jennings</surname>
            ,
            <given-names>N.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McBurney</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parsons</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sonenberg</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Argumentation-based negotiation</article-title>
          .
          <source>The Knowledge Engineering Review</source>
          <volume>18</volume>
          (
          <issue>4</issue>
          ) (
          <year>2003</year>
          )
          <volume>343</volume>
          {
          <fpage>375</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Fatima</surname>
            ,
            <given-names>S.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wooldridge</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jennings</surname>
            ,
            <given-names>N.R.</given-names>
          </string-name>
          <article-title>: Multi-issue negotiation under time constraints</article-title>
          .
          <source>In: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 1. AAMAS '02</source>
          , New York, NY, USA, ACM (
          <year>2002</year>
          )
          <volume>143</volume>
          {
          <fpage>150</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Braun</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brzostowski</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kersten</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kowalczyk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Strecker</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vahidov</surname>
          </string-name>
          , R.:
          <article-title>e-negotiation systems and software agents: Methods, models, and applications</article-title>
          . In:
          <article-title>Intelligent Decision-making Support Systems</article-title>
          . Decision Engineering. Springer London (
          <year>2006</year>
          )
          <volume>271</volume>
          {
          <fpage>300</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Faratin</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          : Automated Service Negotiation Between Autonomous Computational Agents.
          <source>PhD thesis</source>
          , University of London, Queen Mary and West eld College, Department of Electronic Engineering (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Sandholm</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Algorithm for optimal winner determination in combinatorial auctions</article-title>
          .
          <source>Arti cial Intelligence</source>
          <volume>135</volume>
          (
          <issue>12</issue>
          ) (
          <year>2002</year>
          )
          <volume>1</volume>
          {
          <fpage>54</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Vanek</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yin</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jain</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bosansky</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tambe</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pechoucek</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Gametheoretic resource allocation for malicious packet detection in computer networks</article-title>
          .
          <source>In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2. AAMAS '12</source>
          ,
          <string-name>
            <surname>Richland</surname>
            ,
            <given-names>SC</given-names>
          </string-name>
          , International Foundation for Autonomous Agents and
          <string-name>
            <given-names>Multiagent</given-names>
            <surname>Systems</surname>
          </string-name>
          (
          <year>2012</year>
          )
          <volume>905</volume>
          {
          <fpage>912</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Bartos</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rehak</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Trust-based solution for robust self-con guration of distributed intrusion detection systems</article-title>
          .
          <source>In: In Proceedings of the 20th European Conference on Arti cial Intelligence (ECAI)</source>
          , IOS Press (
          <year>2012</year>
          )
          <volume>121</volume>
          {
          <fpage>126</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Bartos</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rehak</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Distributed self-organized collaboration of autonomous ids sensors</article-title>
          .
          <source>In: Dependable Networks and Services</source>
          , Heidelberg, Springer (
          <year>2012</year>
          )
          <volume>113</volume>
          {
          <fpage>117</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Parsons</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giorgini</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>An approach to using degrees of belief in bdi agents</article-title>
          . In Bouchon-Meunier,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Yager</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Zadeh</surname>
          </string-name>
          , L., eds.: Information, Uncertainty and Fusion. Volume
          <volume>516</volume>
          of The Springer International Series in Engineering and Computer Science. Springer US (
          <year>2000</year>
          )
          <volume>81</volume>
          {
          <fpage>92</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Kraus</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sycara</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Evenchik</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Reaching agreements through argumentation: a logical model and implementation</article-title>
          .
          <source>Arti cial Intelligence</source>
          <volume>104</volume>
          (
          <issue>12</issue>
          ) (
          <year>1998</year>
          )
          <volume>1</volume>
          {
          <fpage>69</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26. sFlow.org:
          <article-title>Tra c monitoring using s ow (</article-title>
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>