<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Modeling an Enhanced Intrusion Detection System using Mobile Agent: A Methodological Framework</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>CCS Concepts</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Isah Olawale Mustapha Al_Hikmah University Ilorin</institution>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>R. G. Jimoh University of Ilorin</institution>
          ,
          <addr-line>Ilorin</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>7</fpage>
      <lpage>9</lpage>
      <abstract>
        <p>Increase demand by all and sundry for internet and share network, has enhanced the development of various network technology that has linked together different people of different motives, consequently it has paved way for malicious and unauthorized user to intrude into information resources of organization. As a result of the advantage embedded in the layered framework and those of signature base approach proposed by a number of earlier researchers, this research proposed an hybridized framework with the use of two comparators for detection of intrusion using secured, collaborative and optimum numbers of mobile agents. The framework if implemented is expected to be of better efficiency with respect to time of detection, storage space and reduction of network congestion.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. INTRODUCTION</title>
      <p>Most companies, institutions and organizations today rely on
information for decision making [4]. Hence, other things being
equal, the efficiency of any organization today depends on how
well it can secure its information resources especially through the
use of computer system [30]. Apart from that, computer system
also responds to issues based on available resources and
information that are presented to it [5]. More so, resources and
information sharing are the two primary objectives of setting up a
computer network such information and resources serve as a
major factor in attaining and sustaining competitive advantage in
the emerging information driven organizations [16].</p>
      <p>This among other factors, led the world into ubiquitous computing
with e-banking ,e-commerce, e-messages, e-training and so on as
its dividend, this however does not come without its challenges as
it equally paved ways for intruder and unauthorized user to gain
undue access to certain sensitive information [17].
A number of previous researchers in the field of information
security equally testify to the fact that information is becoming
more vulnerable [17]. Computer network consists of
heterogeneous entities that include all kinds of processors,
communication devices, and different human beings with different
motives. Along with the heterogeneous nature of each of the
entities on computer network, the entities have continuously
diversify exponentially over the years [9].</p>
      <p>The internet traffic together with it’s data and other resources is
on the increasing trend and it is projected to maintain such trend
as far back as 2009 [9]. This is illustrated in Figure 1.
Consequently, network overload, delay in network transmission,
insufficient storage facilities, inadequate information, insufficient
resources, traffic congestions that result to dropping of packet
along the channel of transmission, increase computational
bottleneck on the central processing modules of applications and
total coordination of network affairs become a problem [9].
These factors among others are posing insecurity problem to the
computer network and are creating more avenues for intrusion
[21]
[32] also stated that Some vital information that are disseminated
within institutions, offices, across offices, between branches of an
organization and different types of establishment today atimes get
to the hands of an unauthorized persons who tampered with the
contents of the information, therefore there is need to put some
security measures in place, capable of detecting intrusion attempt
promptly across every network settings otherwise lots of valuable
data and other sensitive information may continue to experience
threats such as impersonation, corruption, repudiation, break-in or
denial of services which can cause serious danger on the
individual or organization that are concerned.</p>
      <p>Insecurity as a result of intrusion has been a teething problem that
has been scaring user of computer network, despite the inevitable
benefit derived from it.</p>
      <p>On 20th Feb. 2012 there was a report by Jinshan that China”s
internet security shows that network insecurity incidents are on a
rising trend. This shows a global trend in the information security
threat.</p>
      <p>In a null shell, the problem of information and network insecurity
especially by virtue of intrusion has become more rampant,
prominent, complicated and dynamic along with the rapid
development of network technology, and up till now the network
security technology has not been able to eradicate intrusion [25].
Hence, there is need for enhancement of the current intrusion
detection technologies capable of prompt detection. Such system
design should not add too much load to the network and must be
fast for better detection.</p>
    </sec>
    <sec id="sec-2">
      <title>2. PROBLEM STATEMENT</title>
      <p>As much as the use of computer network even internet is
inevitable in the emerging information driven world, rapid
development and increase demand for internet has pave way for
malicious user to illegally intrude into computer network [27].
Day in day out, number of attackers is increasing, and the
technologies and the targets of attacks are diversified [18]. These
among other insecurity issues has led to various researches and
development of IDS with the use of different technologies that
include data mining, multi agent, Honey pot, multiclass, mobile
agent etc.</p>
      <p>Up till today, previous research work reveals that, the technology
of mobile agent can still be enhanced to reduce the dynamism and
mutative rapid development of hacker technology and that the
benefit of using mobile agents in detecting intrusion cannot be
denied, however securing the agent itself still poses a great
challenge in the information security domain [28]. Therefore,
mobile agent effectiveness in IDS depends on some factors
relating to the agent itself [15].</p>
      <p>According to [15], mobile agent portability, and security affect
agent system’s usability and efficiency in intrusion detection.
Hence, attempt to improve on the security of mobile agent result
to increase in network load on the part of the agent system. [14]
also asserted that the main obstacle hindering the application of
mobile agent to IDS is insecurity on the part of the agent. This
reveals that if mobile agent is highly secured, the performance of
IDS will be improved. The question here is that if such
performance is improved through the enhancement of mobile
agent security, would there be any significant effect on the
network traffic and network load?.
[28] also enlisted some shortcoming of mobile agent in the area of
insecurity that has affected the usability and performance of IDS.
In a recent study of mobile agent security threats, it was stated
that lots of security issues of mobile agent needs to be addressed
and such issues include inter mobile agent collaboration, and
mutual authentication between host and mobile agents [1].
[25] also claimed that agents’ security, management, coordination,
and collaboration are important problems for effective
identification of distributed attack in a system. The fact here is
that when agents are highly secured and well collaborated, better
detection of attack by the agent’s system can be achieved. In such
scenario, how can secured agents be achieved to mutually address
intrusions with little or no effect on system usability and
efficiency ?
What enhancement can be done on agents such that there will be
little or no effect on processor’s load , processing time and
network traffic ?
3.</p>
    </sec>
    <sec id="sec-3">
      <title>METHODOLOGY</title>
      <p>As a result of the need to make effective usage of mobile agents
and to take advantage of their inevitable characteristics for
intrusion detection, this research is aimed at proposing an
enhanced intrusion detection model with the use of more secured
and collaborative mobile agents. Since mobile agent is central to
the proposed model for intrusion detection then the idea is to
improve their safety, collaborative ability and reduce their
response time such that the agent system usability and efficiency
can be improved.</p>
      <p>To this end, this research work proposed an improvement on the
framework of [11] where mobile agents were used to detect user
anomalities (i.e model of normal behaviour) in two level: user
activities and program operations. The model uses two approaches
which include misuse detection approach (model of abnormal
behaviour base on experience) and anomaly approach, this
hybridized approaches is proposed to enhance effectiveness of the
detection. It will also give room for Network Administrator to
make a decision on the suspected intrusion so as to avoid False
Positive Alarm to some extent. It gives room for mobile agents to
collaborate by triggering and communicating on any detected
intrusion then store the characteristics of such intrusion attempt,
this also enhance fast detection when such attempt is made again.
3.1</p>
    </sec>
    <sec id="sec-4">
      <title>Modified Hybrid Framework</title>
      <p>The architecture of this proposed model consists of two
comparators being handled by mobile agent as shown below:</p>
      <sec id="sec-4-1">
        <title>User Profile</title>
        <p>Ye
s</p>
        <p>Block Access
[Second Comparator]. Store the
characteristics of detected
intrusions &amp; compare it with
the present Users profile
Administrato
r
Response
Interface</p>
        <p>Block Access
&amp; Transfer
Characteristics</p>
        <p>Detected Intrusions
Characteristics From
Other AGENTs &amp;
Networks
Mobile agent will perform the function of comparing profile in the
first and second comparators. It will gather information and data
relating to user and process profile of its domain from repository,
this task is performed on timely basis or based on an event
occurrence.</p>
        <p>Each agent will have an access to relay the
characteristics of detected intrusion within its domain to other
agents outside its domain and within some other network for
future detection (collaboration). Such characteristics may include
recorded user activities, start time, speed of input, system resource
used, energy consumption, and some other expected deviance
behavior of user and process detail for comparism purpose. Here,
matching algorithm can be used by agent.
3.2</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Mobile Agent Security Enhancement</title>
      <p>Since security is also a key factor in ensuring the efficiency, ease
of use and wide spread deployment of intrusion detection
application base on mobile agent technology. Without proper
solution to security problem of mobile agent, there will be severe
impediment on IDS. Therefore, the following principles of
mobile agent need to be applied to guarantee safety of the agents
[11]:
1. Participants cannot be assumed to trust each other by default.
2. Any agent-critical decisions should be made on trusted hosts.
3. Unchanging components of the state should be sealed
cryptographically.</p>
      <p>Therefore, this research design has proposed to look at
security issues of mobile agents from four different perspectives
of threat as follows</p>
      <sec id="sec-5-1">
        <title>Agent to platform threat.</title>
      </sec>
      <sec id="sec-5-2">
        <title>Platform to agent threat.</title>
      </sec>
      <sec id="sec-5-3">
        <title>Agent to agent threat.</title>
      </sec>
      <sec id="sec-5-4">
        <title>Platform to platform threat [1]</title>
        <p>Some of those threats that can cause insecurity include Alteration,
Eavesdropping, Repudiation, Denial of service, Unauthorized
Access, Masquerading etc.</p>
        <p>i. Masquerading is away of impersonating legitimate
user, it gives room for extraction of sensitive
information by the fake agent.
ii. Unauthorized access exist by way of illegal
interference with a platform or when agents invoke
the public method of another agent.
iii. Denial of service as to do with exhausting
resources so that others can be deprived of it.
iv. Repudiation attack refers to threat that involve
preventing agent from participating in
communication or transaction.
v. Alteration is a threat that has to do with undetected
change of code or data of an agent.
vi. Eavesdropping is a passive attack that involves the
interception and monitoring of secret
communication.</p>
        <p>It may be concluded by close assessment and analysis of some of
the above listed threats, that agents may be safe to certain level if</p>
      </sec>
      <sec id="sec-5-5">
        <title>Their privacy and integrity is assured.</title>
        <p>Agent to platform or server authentication is
ensured.</p>
        <p>Authorization and access control is highly
observed [11].</p>
        <p>In a null shell, to provide security for mobile agents in this model
against all or some of the above mentioned threats, this research
work proposed to employ some of the following techniques:
i.
ii.
iii.
ii.
iv.
vi.
transmission, network traffic congestion and on computational
and processing time of the central processor. Hence, to improve
the performance of the proposed design as regard to fastness and
network traffic, we propose the use of Dijkstra Algorithm as
follows:</p>
        <p>In line with Dijkstra algorithm, G is propose to be a
graph which will represent the network of nodes in a domain and
is going to have two sets associated with it.</p>
        <p>The first set is N which represents all nodes in the domain.
The second set is C which represents all connections between
nodes in the domain.</p>
        <p>For each c ϵ C, we have d(c) ≥ 0, which represents the delay of
edge c.</p>
        <p>The symbol σ will be used to represent the delay of the shortest
path from one node to another node within the domain.
Having defined these symbols we can formally define our mobile
agent placement method as follows:</p>
        <p>Given G = (N, C) where each c ϵ C, d(c) &gt; 0 , select a
node v ϵ V, such that the maximum σ from node v to all other
nodes in the domain, will be the minimum. This will be the
location for an agent to be placed. (i.e minmum of the maximum
delay)
Alternatively we can say that the node with min{max {σ(v, vi v )
for i v ϵ V}for j ϵ V } will be the location for an agent to be
place within the domain.</p>
        <p>Hence for practical purpose, we shall examine the delay
from a node to all other nodes within a domain and pick the
maximum delay for all the available nodes and store it in an array
call MAXARRAY. Then from MAXARRAY we shall pick the
node with the smallest and place our Mobile Agent there.</p>
        <p>The diagram and table below shows an instance of this:
During collaboration between agent from other
domain for exchange of intrusion characteristics,
agent and platform will be design to authenticate
themselves (i.e verification of each other identity).</p>
        <p>Implementation of this is proposed to use digital
signature and password protection strategies.</p>
        <p>To enhance high level of agent data and
behavioural privacy, encryption and cloning is
proposed.</p>
        <p>Agent communication and security related
transactions is proposed to be recorded so that
auditing and tracing of non participating agent can
be fish out.</p>
        <p>Platform will be structured in such away that it can
control concurrent and simultaneous access to data
and services. It must also be a good manager of
dead lock.</p>
        <p>A platform or agent will also be design to signal
the administrator in case any agent belonging to a
domain has been changed or not, by monitoring a
code that has been tempered, or whose state has
been changed or whose execution flow has been
redirected.</p>
        <p>Some other proposed mobile agent security
mechanism for this model includes hash function,
range checker, execution tracing and cryptography
that allows detection of attack against code
manipulation.</p>
        <sec id="sec-5-5-1">
          <title>3.3 Placement and Distribution Enhancement</title>
          <p>It is not an overemphasis, to say that too much of mobile agents in
many intrusion detection application have an effect on data</p>
        </sec>
        <sec id="sec-5-5-2">
          <title>NODE A B C</title>
          <p>D</p>
          <p>E
Hence from MAXARRAY, NODE C is the appropriate node to
place the mobile agent such that the IDS can be more efficient by
virtue of less workload. This is to say that Node C alone may be
assigned an agent rather than assigning agents to every nodes
within the domain.</p>
          <p>We can also have a SORTED MAXARRAY as shown in Table 3
below
As an instance, the domain in the above diagram has five nodes
and the weight of the delay from node to node is has shown
above. Therefore, N = 5 and for the connection between node a
to node e
We have the following alternative connections together with their
respective delay,</p>
          <p>Atimes increasing the number of agents in the network will allow
intrusions, anomalies and other security issues to be detected
faster as well as spread the workload out across the network.
Suppose we have a very large network consisting of network of
networks, in which case there is a need to use more than a single
agent in the agent system (i.e the proposed intrusion detection
system) for effective intrusion detection.</p>
          <p>Therefore in such scenario, we propose the following strategies
inline with the above MAXARRAY list for selection and
assignment of mobile agent to various domain within a large
network. As an instance, suppose the outcome of our SORTED
MAXARRAY is as follows:
Consequently, Table 5 clearly indicates that if we are to assign
two agents, they should be place in Node a and Node c. Apart
from that , mobile agent in Node a should be responsible for node
a and node b while mobile agent in Node c should be responsible
for Node c, Node d, and Node e. Hence this kind of assignment
strategy is proposed for this research design so as to use minimum
mobile agents that can respond to every other nodes efficiently in
case of any intrusion to our network.
3.4.1 Algorithm for Placement and Distribution of
Mobile Agent.</p>
          <p>Single mobile agent placement algorithm for small network
i) Input all the available nodes delay
ii) Apply Dijkstra Algorithm to get all shortest
distance from node to node
iii) For each node, select the highest delay out of
all the available shortest delay from a node to
all other nodes.
iv) Tabulate all the highest delay with their
corresponding node.
v) Sort the table in ascending order
vi) Output the node with the smallest delay in the
table
3.4.2 Multiple Mobile Agent Placement Algorithm
for Large Network.</p>
          <p>i. Input the max(min(delay)) for each node.
ii. Arrange and tabulate them in ascending order.
iii Select the number of node you need in line
with tabulated order. Ziv Create your
multiple agent assignment table
v Determine and pick which of the nodes has a
minimum delay to the selected node
vi Output the selected node with those node for
which they have minimum delay.
3.5</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Experimental Data:</title>
      <p>This research work proposed to use randomly generated data to
evaluate the efficiency of the research model through a series of
experimental simulation. The randomly generated data shall be
used to evaluate the resources required to operate the IDS model
on a computer in term of memory usage, network traffic, network
load and processing load.</p>
    </sec>
    <sec id="sec-7">
      <title>CONCLUSION</title>
      <p>This paper has presented a proposed research framework which is
aimed at faster detection of attack, reduction of network
congestion and bottle neck in packet processing. After
implementation, it stand to be robust by it’s ability to receive
characteristics of known attack from other network user and it’s
hybridized usage of user activity, and program operation
monitoring for intrusion detection.
Mohammed, H. A. (2015). HYBRID INTELLIGENT
APPROACH FOR NETWORK. MALAYSIA.
ntrusion-detection-system-group.co.uk. (n.d.). Retrieved
march 15, 2015, from intrusion-detection-system-group:
http://www.intrusion-detection-system-group.co.uk
Pages 158-164.</p>
      <p>Pathak, H. (2011). Hybrid Security Architecture (HSA) for
Secure Execution. International Journal of Information
Technology , 499-502.</p>
      <p>Ran, Z. (2012). A Model of Collaborative Intrusion
Detection System based on Multi-agents. International</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Amro</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Mobile Agent Systems, Recent Security Threats and Counter Measures</article-title>
          .
          <source>Journal of ResearchGate.</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Pages</surname>
          </string-name>
          160-
          <fpage>167</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Ande</surname>
            ,
            <given-names>A. T.</given-names>
          </string-name>
          (
          <year>2013</year>
          ) (ed),
          <source>History and Philosophy of Science in General Studies, General Studies Division</source>
          , University of Ilorin, ISBN:
          <fpage>978</fpage>
          -
          <lpage>36284</lpage>
          -0
          <article-title>-2 Bernardes and Moreira (</article-title>
          <year>2000</year>
          ),
          <source>Implementation of an Intrusion Detection System Based on Mobile Agent.</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>international symposium on software engineering for parallel and distributed systems IEEE Computer Society</article-title>
          , Chapke,
          <string-name>
            <given-names>P. P.</given-names>
            , and
            <surname>Raut</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. B.</surname>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>Intrusion Detection System using Fuzzy logic and Data Mining Technique</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <source>International Journal of Advanced Research in Computer Science and Software Engineering , Pages</source>
          <volume>152</volume>
          -
          <fpage>154</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Cichonski</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Millar</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grance</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Scarfone</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>Computer Security Incident Handling Guide</article-title>
          . USA: Special Publication 800-
          <issue>61 Revision 2</issue>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>Corporate White</given-names>
            <surname>Paper</surname>
          </string-name>
          .
          <article-title>"Deploying and Tunning Network Intrusion Detection System." intrusion</article-title>
          .
          <source>com White Paper</source>
          <year>2001</year>
          (
          <year>2004</year>
          ): 3 Ehimen,
          <string-name>
            <given-names>O. R.</given-names>
            , &amp;
            <surname>Oyakhilome</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
          (
          <year>2009</year>
          ).
          <article-title>Development of a Software Based Firewall System for Computer Network</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <source>Leonardo Electronic Journal of Practices and Technologies</source>
          ,
          <volume>75</volume>
          -
          <fpage>80</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Ganapathy</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yogesh</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Kannan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Holtz</surname>
            ,
            <given-names>M. D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>David</surname>
            ,
            <given-names>B. M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Timoteo</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <article-title>Building Scalable Distributed Intrusion Detection System Based on the MapReduced Framework</article-title>
          .
          <source>REVISTA TELECOMUNICACOES</source>
          ,
          <volume>22</volume>
          -
          <fpage>31</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Jabez</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Muthukumarb</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Intrusion Detection System (IDS): Anomaly Detection using Outlier.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <source>International Conference on Intelligent Computing, Communication &amp; Convergence</source>
          (pp.
          <fpage>338</fpage>
          -
          <lpage>346</lpage>
          ). India: Procedia Computer Science Press.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>Jaisankar</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saravanan</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Swamy</surname>
            ,
            <given-names>K. D.</given-names>
          </string-name>
          (
          <year>July 2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <given-names>Intelligent</given-names>
            <surname>Intrusion Detection System Framework Using Mobile</surname>
          </string-name>
          .
          <source>International Journal of Network Security &amp; Its Applications (IJNSA)</source>
          , Vol
          <volume>1</volume>
          , No 2.,
          <fpage>72</fpage>
          -
          <lpage>88</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>Jansen</surname>
            ,
            <given-names>W. A.</given-names>
          </string-name>
          (
          <year>2003</year>
          ).
          <article-title>Intrusion Detection With Mobile Agents</article-title>
          . USA: NIST Special Publication 800-.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>Jansen</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Karygiannis</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (october,
          <year>2000</year>
          ).
          <article-title>Privilege Management of Mobile Agents</article-title>
          .
          <source>Twenty-third National Information Systems Security Conference</source>
          (pp. pp.
          <fpage>362</fpage>
          -
          <lpage>370</lpage>
          ). USA: NIST Special publication.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Jansen</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mell</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karygiannis</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Marks</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>1999</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <given-names>Applying</given-names>
            <surname>Mobile</surname>
          </string-name>
          <article-title>Agents to Intrusion Detection and Response</article-title>
          .
          <source>National Institute of Standards</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>46</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <surname>Jianxiao</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Lijuan</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2009</year>
          ).
          <article-title>Research of Distributed Intrusion Detection System Model Based</article-title>
          .
          <source>International Forum on Information Technology and Applications</source>
          ,
          <volume>53</volume>
          -
          <fpage>57</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <surname>Jimoh</surname>
            ,
            <given-names>R. G.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Knowledge Management Functionality by Information Technology in Adeleke, B</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Abdus-Salam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            &amp;
            <surname>Kabiri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            , &amp;
            <surname>Ghorbani</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. A.</surname>
          </string-name>
          (
          <year>2005</year>
          ). Research on Intrusion Detection and Response:.
          <source>International Journal of Network Security</source>
          , ,
          <volume>84</volume>
          -
          <fpage>102</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <surname>Lee</surname>
          </string-name>
          , D.-h.,
          <string-name>
            <surname>Kim</surname>
          </string-name>
          , D.-y., &amp;
          <string-name>
            <surname>Jung</surname>
            ,
            <given-names>J.-i.</given-names>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>Multi-Stage Intrusion Detection System Using Hidden Markov Model Algorithm</article-title>
          .
          <source>International Conference on Information Science and Security</source>
          ,
          <volume>72</volume>
          -
          <fpage>77</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Stolfo</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2001</year>
          ).
          <article-title>Real time data mining-based intrusion detection</article-title>
          .
          <source>Proceedings of DARPA Information</source>
          , pp.
          <fpage>89</fpage>
          -
          <lpage>100</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          www.media.mit.edu/~nelson/research/routes/.
          <source>Retrieved 11 03</source>
          ,
          <year>2014</year>
          , from www.media.mit.edu/~nelson/research/routes/: http://www.media.mit.edu/~nelson/research/routes/ [26] [27
          <source>] [28] Conference on Computer Science and Service System</source>
          ,
          <fpage>789</fpage>
          -
          <lpage>792</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <surname>Scarfone</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Mell</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2007</year>
          ).
          <article-title>Guide to Intrusion Detection and Prevention Systems. National Institute of Standard and Technology</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <string-name>
            <surname>Tian</surname>
          </string-name>
          , -r. L., &amp;
          <string-name>
            <surname>Pan</surname>
          </string-name>
          , W.-m. (
          <year>2005</year>
          ).
          <source>Intrusion Detection System Based on New Association Rule Mining Model.</source>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <string-name>
            <surname>Trushna</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , Patil1,
          <string-name>
            <given-names>K.</given-names>
            , &amp;
            <surname>Banchhor</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <source>International Journal of Advanced Research in Computer and Communication Engineering</source>
          ,
          <fpage>1901</fpage>
          -
          <lpage>1903</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <string-name>
            <surname>Verwoerd</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Hunt</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2003</year>
          ).
          <source>Intrusion Detection Techniques and Approaches.</source>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <string-name>
            <surname>Whitman</surname>
            ,
            <given-names>Michael E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Townsend</surname>
            ,
            <given-names>Anthony M.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Hendrickson</surname>
          </string-name>
          , Anthony R. “
          <article-title>Cross-National Differences in Computer-Use Ethics: A Nine Country Study</article-title>
          .”
          <source>The Journal of International Business Studies</source>
          <volume>30</volume>
          , no.
          <issue>4</issue>
          (
          <year>1999</year>
          ):
          <fpage>673</fpage>
          -
          <lpage>687</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          <string-name>
            <surname>Yanxin W.</surname>
          </string-name>
          (
          <year>2004</year>
          ).
          <article-title>An hybrid intrusion detection system (Unpublished dissertation)</article-title>
          . Iowa State University, Ames.
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <source>Retrieved from UMI Microform 3145689 Zirra</source>
          ,
          <string-name>
            <given-names>P. B.</given-names>
            , &amp;
            <surname>Wajiga</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. M.</surname>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Cryptographic algorithms for Secure data Communication</article-title>
          .
          <source>International Journal of computer science and Security</source>
          ,
          <volume>227</volume>
          -
          <fpage>243</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>