Nasir L.M.Seman K.Saudi M.M.2024-05-292024-05-292008978077000000010.1109/CIT.2008.Workshops.1222-s2.0-52049102921https://www.scopus.com/inward/record.uri?eid=2-s2.0-52049102921&doi=10.1109%2fCIT.2008.Workshops.122&partnerID=40&md5=5c25ddbd7a824f9caa5222d862713640https://oarep.usim.edu.my/handle/123456789/9769Agent-based IDS is a powerful technique used by network administrator to monitor traffic activities in their network. However, the widespread network coverage has introduced a possibility of a hacker installing unauthorized agents or fake agents secretly within the network. This is considered as a very serious threat to the network security. This paper proposes a protocol that is used to detect the presence of a fake agent upon its installation. The technique is a combination of Elgamal encryption, Elgamal digital signature, and SHA-I message digest function. A simple implementation was developed to test the proposed protocol. � 2008 IEEE. DOI 10.1109/CIT.2008.Workshops.122.en-USAgentsComputer crimeCryptographyFinancial data processingInformation technologyInstallationInternetLaws and legislationPersonal computingTechnologyAgent-basedEl Gamal encryptionElgamal digital signatureInternational conferencesMessage digestNetwork administratorsNetwork coverageNetwork protocolsAgent verification protocol in agent-based IDSConference Paper2942994568519