Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/9821
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKumar, Anil-
dc.date.accessioned2014-11-20T11:05:58Z-
dc.date.available2014-11-20T11:05:58Z-
dc.date.issued2004-
dc.identifierM.Techen_US
dc.identifier.urihttp://hdl.handle.net/123456789/9821-
dc.guideGarg, Kum Kum-
dc.description.abstractMobile Agent (MA) technology is generating increasing interest in and providing elegant and uniform solutions to a wide range of applications, from network management to mobile computing and from distributed information retrieval to distributed security management. .A mobile agent is a software agent that can migrate, at a time of its own choosing, from machine to machine in a heterogeneous network. A MA that is used in distributed security management can be characterized as a Security Mobile Agnt (SMA). An anomaly can be defined as "A deviation of the system from the normal system usage patterns". Anomaly detection is based on the observation of deviations from normal system usages patterns. It is detected by building up a profile of the system being monitored, and detecting significant deviations from this profile. This report describes the implementation of a Distributed Security Mobile Agent System (DSMAS)-for monitoring and anomaly detection on networked computers. It consists of a set of security agents. There are Monitoring agents which monitor multiple levels (packet and system) of networked computers to determine the correlation among the observed anomalous patterns, and report such abnormal behavior to the network administrator and/or to a Decision/Action (D/A ) Agent. The D/A agent takes action to counter a suspected security violation or reports it to the user. The report focuses on the design. aspects of such a monitoring and anomaly detection system by integrating Adaptive Resonance Theory (ART-2) and mobile agent technology. The PMADE (Platform for Mobile Agent Distribution and Execution) system, developed at IIT Roorkee, is used as the base agent architecture. The application is developed using JAVA J2SDK1.42, Kwrite text editor and tested on Mandrake Linux 9.2 and runs on three networked Pentiums running PMADE.en_US
dc.language.isoenen_US
dc.subjectELECTRONICS AND COMPUTER ENGINEERINGen_US
dc.subjectNETWORK MONITORINGen_US
dc.subjectANOMALY DETECTIONen_US
dc.subjectMOBILE SECURITY AGENTSen_US
dc.titleNETWORK MONITORING AND ANOMALY DETECTION USING MOBILE SECURITY" AGENTS"en_US
dc.typeM.Tech Dessertationen_US
dc.accession.numberG11596en_US
Appears in Collections:MASTERS' THESES (E & C)

Files in This Item:
File Description SizeFormat 
ECDG11596.pdf13.96 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.