Publication: Agent verification protocol in agent-based IDS
dc.Conferencecode | 73496 | |
dc.Conferencedate | 8 July 2008 through 11 July 2008 | |
dc.Conferencelocation | Sydney | |
dc.Conferencename | 8th IEEE International Conference on Computer and Information Technology Workshops, CIT Workshops 2008 | |
dc.contributor.affiliations | Faculty of Science and Technology | |
dc.contributor.affiliations | Universiti Sains Islam Malaysia (USIM) | |
dc.contributor.author | Nasir L.M. | en_US |
dc.contributor.author | Seman K. | en_US |
dc.contributor.author | Saudi M.M. | en_US |
dc.date.accessioned | 2024-05-29T01:55:53Z | |
dc.date.available | 2024-05-29T01:55:53Z | |
dc.date.issued | 2008 | |
dc.description.abstract | Agent-based IDS is a powerful technique used by network administrator to monitor traffic activities in their network. However, the widespread network coverage has introduced a possibility of a hacker installing unauthorized agents or fake agents secretly within the network. This is considered as a very serious threat to the network security. This paper proposes a protocol that is used to detect the presence of a fake agent upon its installation. The technique is a combination of Elgamal encryption, Elgamal digital signature, and SHA-I message digest function. A simple implementation was developed to test the proposed protocol. � 2008 IEEE. DOI 10.1109/CIT.2008.Workshops.122. | |
dc.description.nature | Final | en_US |
dc.identifier.ArtNo | 4568519 | |
dc.identifier.doi | 10.1109/CIT.2008.Workshops.122 | |
dc.identifier.epage | 299 | |
dc.identifier.isbn | 9780770000000 | |
dc.identifier.scopus | 2-s2.0-52049102921 | |
dc.identifier.spage | 294 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-52049102921&doi=10.1109%2fCIT.2008.Workshops.122&partnerID=40&md5=5c25ddbd7a824f9caa5222d862713640 | |
dc.identifier.uri | https://oarep.usim.edu.my/handle/123456789/9769 | |
dc.language | English | |
dc.language.iso | en_US | |
dc.relation.ispartof | Proceedings - 8th IEEE International Conference on Computer and Information Technology Workshops, CIT Workshops 2008 | |
dc.source | Scopus | |
dc.subject | Agents | en_US |
dc.subject | Computer crime | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Financial data processing | en_US |
dc.subject | Information technology | en_US |
dc.subject | Installation | en_US |
dc.subject | Internet | en_US |
dc.subject | Laws and legislation | en_US |
dc.subject | Personal computing | en_US |
dc.subject | Technology | en_US |
dc.subject | Agent-based | en_US |
dc.subject | El Gamal encryption | en_US |
dc.subject | Elgamal digital signature | en_US |
dc.subject | International conferences | en_US |
dc.subject | Message digest | en_US |
dc.subject | Network administrators | en_US |
dc.subject | Network coverage | en_US |
dc.subject | Network protocols | en_US |
dc.title | Agent verification protocol in agent-based IDS | |
dc.type | Conference Paper | en_US |
dspace.entity.type | Publication |