Publication:
Agent verification protocol in agent-based IDS

No Thumbnail Available

Date

2008

Journal Title

Journal ISSN

Volume Title

Publisher

Research Projects

Organizational Units

Journal Issue

Abstract

Agent-based IDS is a powerful technique used by network administrator to monitor traffic activities in their network. However, the widespread network coverage has introduced a possibility of a hacker installing unauthorized agents or fake agents secretly within the network. This is considered as a very serious threat to the network security. This paper proposes a protocol that is used to detect the presence of a fake agent upon its installation. The technique is a combination of Elgamal encryption, Elgamal digital signature, and SHA-I message digest function. A simple implementation was developed to test the proposed protocol. � 2008 IEEE. DOI 10.1109/CIT.2008.Workshops.122.

Description

Keywords

Agents, Computer crime, Cryptography, Financial data processing, Information technology, Installation, Internet, Laws and legislation, Personal computing, Technology, Agent-based, El Gamal encryption, Elgamal digital signature, International conferences, Message digest, Network administrators, Network coverage, Network protocols

Citation

Collections