Skip to main content

Effective Contract-Net-Based Intrusion Detection Using Intelligent Agent-Based Systems

  • Chapter
  • First Online:
Computational Intelligence and Mathematics for Tackling Complex Problems 5

Abstract

Intrusion detection is an important task, many times extremely difficult, related to the security policies of an organization that uses digital data and information distributed networks. Intrusion Detection Systems (IDSs) should monitor network traffic and user activity at the same time, to detect malicious traffic and abnormal activity. In this paper, we propose an intelligent agent security approach for adopting IDSs in a distributed computational network-based environment. The solution is a decentralized, agent-based IDS that allocates tasks to knowledge-based agents for collecting, analyzing, and delivering at the same time data needed for identifying threats and for doing effective actions. The advantages of this approach are: scalability, handling increased load and network latency, and no single point of failure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Scarfone, K., Mell, P.: NIST Special Publication 800-94, Guide to Intrusion Detection and Prevention Systems (IDPS), Recommendations of the National Institute of Standards and Technology, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD, United States, 20899–8930 (2007)

    Google Scholar 

  2. Anderson, R.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, New York (2001)

    Google Scholar 

  3. Kunang, Y.N., Nurmaini, S., Stiawan, D., Suprapto, B.Y.: Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. J. Inf. Secur. Appl. 58, 102804 (2021)

    Google Scholar 

  4. Sebring, M.M., Shellhouse, E., Hanna, M.E., Whitehurst, R.A.: Expert Systems in Intrusion Detection: A Case Study, Proceeding of the 11th National Computer Security Conference, pp. 74–81. Baltimore, MD (1988)

    Google Scholar 

  5. Lunt, T.F.: IDES: An intelligent system for detecting intruders,. In: Proceedings of the Symposium on Computer Security; Threats, and Countermeasures; Rome, November 22–23, 1990, 110–121 (1990)

    Google Scholar 

  6. Barbara, D., Couto, J., Jajodia, S., Wu, N.: ADAM: detecting intrusions by data mining. In: Proceedings of the IEEE Workshp on Information Assurance and Security, West Point, NY, June 5–6, IEEE CS, 11–16 (2001)

    Google Scholar 

  7. Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31(23–24), 2435–2463 (1999)

    Article  Google Scholar 

  8. Hunter, P.: Distributed intrusion detection systems (DIDS) can make security more adaptive. Netw. Secur. 2003(3), 16–18 (2003)

    Article  Google Scholar 

  9. Ossec documentation http://www.ossec.net/doc. Accessed 23 June 2022

  10. Crainicu, B., Iantovics, B.: Cryptanalysis of KSAm-like algorithms. In: Proceedings of the 1st International Conference on Complexity and Intelligence of the Artificial and Natural Complex Systems. Medical Applications of the Complex Systems. Biomedical Computing, B. Iantovics, et al. (Ed.), pp. 130–148. IEEE Computer Society Press (2009)

    Google Scholar 

  11. Crainicu, B., Iantovics, B.: An agent-based security approach for intrusion detection systems. In: Hluchý, L., Kurdel, P., Sebestyénová, J. (Eds.) Proceedings of the 7th International Workshop on Grid Computing for Complex Problems, GCCP 2011, October 24–26, 2011 Bratislava, pp. 126–134. (2011)

    Google Scholar 

  12. Angiulli, F., Basta, S., Pizzuti, C.: Distance-based detection and prediction of outliers. IEEE Trans. Knowl. Data Eng. 18(2), 145–160 (2006)

    Article  Google Scholar 

  13. Logeswari, G., Bose, S., Anitha, T.: An intrusion detection system for SDN using machine learning. Intell. Autom. Soft Comput. 35(1), 867–880 (2023)

    Article  Google Scholar 

  14. Sivanantham, S., Mohanraj, V., Suresh, Y., Senthilkumar, J.: Association rule mining frequent-pattern-based intrusion detection in network. Comput. Syst. Sci. Eng. 44(2), 1617–1631 (2023)

    Article  Google Scholar 

  15. Karthikeyan, D., Raj, V.M., Senthilkumar, J., Suresh, Y.: Intrusion detection using ensemble wrapper filter based feature selection with stacking model. Intell. Autom. Soft Comput. 35(1), 645–659 (2023)

    Article  Google Scholar 

  16. Amulya, A., Swarup, K.S., Ramanathan, R.: Spectral analysis based robust multi-level intrusion detection in wide area frequency control. Int. J. Electr. Power Energy Syst. 143, 108430 (2022)

    Article  Google Scholar 

  17. Saheed, Y.K., Abiodun, A.I., Misra, S., Holone, M.K.: Colomo-Palacios. R, A machine learning-based intrusion detection for detecting internet of things network attacks 61(12), 9395–9409 (2022)

    Google Scholar 

  18. Gopi, R., Sheeba, R., Anguraj, K., Chelladurai, T., Alshahrani, H.M., Nemri, N., Lamoudan, T., Lamoudan, T.: Intelligent intrusion detection system for industrial internet of things environment. Comput. Syst. Sci. Eng. 44(2), 1567–1582 (2023)

    Article  Google Scholar 

  19. Nagalalli, G., Ravi, G.: A novel MegaBAT optimized intelligent intrusion detection system in wireless sensor networks. Intell. Autom. Soft Comput. 35(1), 475–490 (2023)

    Article  Google Scholar 

  20. Muthanna, M.S.A., Alkanhel, R., Muthanna, A., Rafiq, A., Abdullah, W.A.M.: Towards SDN-enabled, intelligent intrusion detection system for internet of things (IoT). IEEE ACCESS 10, 22756–22768 (2022)

    Article  Google Scholar 

  21. Seth, S., Chahal, K.K., Singh, G.: A novel ensemble framework for an intelligent intrusion detection system. IEEE ACCESS 9, 138451–138467 (2021)

    Article  Google Scholar 

  22. Iantovics, L.B.: Black-box-based mathematical modelling of machine intelligence measuring. Mathematics 9(6), 681 (2021)

    Article  Google Scholar 

  23. Iantovics, L.B., Rotar, C., Niazi, M.A.: MetrIntPair—a novel accurate metric for the comparison of two cooperative multiagent systems intelligence based on paired intelligence measurements. Int. J. Intell. Syst. 33(3), 463–486 (2018)

    Article  Google Scholar 

  24. Iantovics, L.B., Kovacs, L., Rotar, C.: MeasApplInt—a novel intelligence metric for choosing the computing systems able to solve real-life problems with a high intelligence. Appl. Intell. 49, 3491–3511 (2019)

    Article  Google Scholar 

  25. Iantovics, L.B., Emmert-Streib, F., Arik, S.: MetrIntMeas a novel metric for measuring the intelligence of a swarm of cooperating agents. Cogn. Syst. Res. 45, 17–29 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

This work was developed in the framework of the COST Action. CA17124—Digital forensics: evidence analysis via intelligent systems and practices (DigForASP).

Additional support for the research was assured by CHIST-ERA programme supported through the ERA-NET Cofund funding scheme under the grant agreements, title: Social Network of Machines (SOON), grant of the Romanian National Authority for Scientific Research and Innovation, CCCDI-UEFISCDI, number 101/2019, COFUND-CHIST-ERA-SOON, within PNCDI III. We acknowledge the support offered by the Research Center on Artificial Intelligence, Data Science, and Smart Engineering (ARTEMIS).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Laszlo Barna Iantovics .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Iantovics, L.B., Hornyák, O., Crișan, G.C., Crainicu, B., Nechita, E. (2024). Effective Contract-Net-Based Intrusion Detection Using Intelligent Agent-Based Systems. In: Cornejo, M., Kóczy, L.T., Medina, J., Ramírez-Poussa, E. (eds) Computational Intelligence and Mathematics for Tackling Complex Problems 5. Studies in Computational Intelligence, vol 1127. Springer, Cham. https://doi.org/10.1007/978-3-031-46979-4_18

Download citation

Publish with us

Policies and ethics