References

AGENT IDS BASED ON MISUSE APPROACH


[1] J. P. Anderson, Computer Security Threat Monitoring and Surveillance, James P. Anderson Company, Fort Washington, Pennsylvania, (1980).

[2] M. Asaka, S. Okasawa, A. Taguchi and S. Goto, A Method of Tracing Intruders by Use of Mobile Agents, Proceedings of the 9th Annual Internetworking Conference (INET‘99), San Jose, California (June 1999).

[3] J. S. Balasubramaniyam, J. O. Garcia-Fernandez, D. Isacoff, E. Spafford and D. Zamboni, An Architecture for Intrusion Detection Using Autonomous Agents, Proceedings of the 14th Annual Computer Security Applications Conference, (December 1998).

[4] F. A. Barika, Vers un IDS Intelligent Base d’Agents Mobiles, Higher Institute of Management (July 2003).

[5] M. C. Bernardes and E. Dos Santos Moreira, Implementation of an intrusion detection system based on mobile agents, International Symposium on Software Engineering for Parallel and Distributed Systems (June 2000), 158-164.

[6] M. Burdach, Hardening the TCP/IP Stack to SYN Attacks, Security Focus, (September 2003).

[7] R. H. Campbell, Z. Liu, M. D. Mickunas, P. Naldurg and S. Yi, Seraphim: An Active Security Architecture for Active Network, UIUCDCS-R-99-2167, UILU-ENG-99-1756, Urbana, IL 61801 (November 1999).

[8] A. Cardon, A distributed multiagent system for the self-evaluation of dialogs, Proceedings of the Joint JSAI 2001 Workshop on New Frontiers in Artificial Intelligence, Springer-Verlag, (2001), 43-50.

[9] CISCO, www.cisco.com, Accessed March 2008.

[10] D. Curry and H. Debar, Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) Document Type Definition, Intrusion Detection Working Group, (January 2003).

[11] N. Daira, Strorshield presentation, www.skyrecon.com, Accessed August 2008.

[12] D. Dasgupta, F. Gonzalez, K. Yallapu, J. Gomez and R. Yarramsettii, CIDS: An agent based intrusion detection system, Computers & Security 24(5) (2005), 387-398.

[13] K. Deeter, K. Singh, S. Wilson, L. Filipozzi and S. Vuong, APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System, Mobility Aware Technologies and Applications, LNCS, Springer, Heidelberg 3284 (2004), 244-253.

[14] D. E. Denning, An intrusion detection model, IEEE Transactions on Software Engineering, SE-13, (1987) 222-232.

[15] Dethy, Examining port scan methods-Analysing Audible Techniques, synnergy.net/downloads /papers/portscan.txt, Accessed April 2001.

[16] F. Dressler, G. Mnz and G. Carle, Attack Detection Using Cooperating Autonomous Detection Systems (CATS), Wilhelm-Schickard-Institute of Computer Science, Computer Networks and Internet, University of Tbingen (2004).

[17] M. Eriksson, An Example of a Man-in-the-middle Attack Against Server Authenticated SSL-sessions, International Conference on Applied Cryptography and Network Security, (October 2003).

[18] Firestorm,www.scaramanga.co.uk, Accessed October 2007.

[19] K. Ghedira, MASC: une approche Multi-Agents de problèmes de Statisfaction de Contraintes, (1993).

[20] L. Gong, Java Security Architecure, Java Soft (July 1997).

[21] T. L. Heberlein, G. V. Dias, K. N. Levitt, B. Mukherjee, J. Wood and D. Wolber, A Network Security Monitor, Proceedings of the Symposium on Research in Securirt and Privacy, (May 1990).

[22] I. M. Hegazy, T. Al-Arif, Z. T. Fayed and H. M. Faheem, A Multi-agent Based System for Intrusion Detection, IEEE Potentials 22(4) (2003), 28-31.

[23] HPING, www.hping.org, Accessed November 2007.

[24] G. Hulmer, J. S. K. Wong, V. Honavar, L. Miller and Y. Wang, Lightweight Agents for Intrusion Detection, Journal of Systems and Software 67 (03) (2003), 109-122.

[25] W. Jansen, P. Mell, T. Karygiannis and D. Marks, Applying mobile agents to intrusion detection and response, NIST Interim Report - 6416, (October 1999).

[26] N. EL Kadhi and P. Boury, Static analysis of Java Cryptographic Applets, Proceedings of ECOOP2001 Workshop on Java Formal Verification, Budapest, (June 2001).

[27] N. EL Kadhi, F. A. Barika, E. Burstein and K. Ghedira, Toward Agent IDS: Agents Platforms Security Features Study, Proceedings of CSC 2003, Computer security Congress, Mexique, March 2003.

[28] S. Kumar and E. Spafford, A Software Architecture to Support Misuse Intrusion Detection, Department of Computer Sciences, Purdue University, (March 1995).

[29] D. B. Lange and M. Oshima, Programming and Deploying Java Mobile Agents with Aglets, Seconde Edition, ISBN 0-201-32582-9, Massachusetts, Addison Wesley, 225 (1998).

[30] L. Me, Z. Marrakchi, C. Michel, H. Debar and F. Cuppens, La detection d’intrusion: les outils doivent cooperer, REE Journal, Revue de l’Electricite et de l’Electronique 5 (May 2001), 50-55.

[31] MonALISA, MONitoring Agents using a Large Integrated Services Architecture, monalisa.cacr.caltech.edu, Accessed August 2008.

[32] B. Mukherjee, T. L. Heberlein and K. N. Levitt, Network Intrusion Detection, IEEE Network, (June 1994).

[33] NMAP, www.insecure.org/nmap, Accessed November 2007.

[34] Palmquis, Intelligent Agents in Computer and Network Management, Texas University, (course paper), 24 (1998).

[35] Prelude-IDS, www.prelude-ids.org, Accessed October 2007.

[36] T. H. Ptacek and T. N. Newsham, Insertion, evasion and denial of service: Eluding network intrusion detection, Secure Network Inc. (January 1998).

[37] De Queiroz, J. D. Da Costa Carmo, L. F. R. Pirmez and L. Micael, An Autonomous mobile agent system to protect new generation networked application, 2nd Annual Workshop on Recent Advances in Intrsuion Detection, (September 1999).

[38] M. J. Ranum, Experiences Benchmarking Intrusion Detection Systems, NFR Security, (December 2001).

[39] RealSecure, www.iss.net, Accessed March 2008.

[40] M. Rehk, M. Pechoucek, P. Celeda, J. Novotn and P. Minark, CAMNEP: agent-based network intrusion detection system. Proceedings of the 7th international Joint Conference on Autonomous Agents and Multiagent Systems (2008), 133-136.

[41] R. U. Rehman, Intrusion Detection Systems with SNORT Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID, Publishing as Prentice Hall PTR Upper Saddle River, New Jersey 07458, ISBN 0-13-140733-3 (2003).

[42] F. S. Rietta, Application Layer Intrusion Detection for SQL Injection, ACM SE06 1012. Melbourne, Florida, USA, (March 2006).

[43] M. Singh and S S. Sodhi, Distributed Intrusion Detection using Aglet Mobile Agent Technology, Proceedings of National Conference on Challenges & Opportunities in Information Technology (COIT-2007) RIMT-IET, Gobindgarh, (March 2007).

[44] SNORT, www.snort.org, Accessed October 2007.

[45] E. H. Spafford and D. Zamboni, Intrusion Detection Using Autonomous Agents, Computer Networks: The Int. Journal of Computer and Telecommunications Networking 34(4) (2000), 547-570.

[46] S. Specht and R. Lee, Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures, Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, (September 2004) 543-550.

[47] Tamandua, tamandua.axur.org, Accessed October 2007.

[48] M. Tatsubori, An Extension Mechanism for the Java Language, University of Tsukuba, (1999).

[49] The Aglets Software Development Kit, sourceforge.net, Accessed June 2002.

[50] A. Trapathi, T. Ahmed, S. Pathak, A. Pathak, M. Carney, M. Koka and P. Dokas, Active Monotoring of Network System using Mobile Agents, University of Minnesota, (May 2002).

[51] Tritheme Distributed and Hybrid Intrusion Detection and Response System, sourceforge.net/projects/tritheme, Accessed August 2007.

[52] G. Vigna, S. Eckmann and R. Kemmerer, Attack Languages, IEEE Information Survivability Workshop, IEEE Computer Society Press, Boston, MA, USA, (2000), 163-166.

[53] H. Q. Wang, Z. Q. Wang, Q. Zhao, G. F. Wang, R. J. Zheng and D. X. Liu, Mobile Agents for Network Intrusion Resistance, APWeb 2006, LNCS, Springer, Heidelberg 3842 (2006), 965-970.