Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science topics
Active In SP

Posts: 610
Joined: Jun 2010
07-06-2010, 07:38 PM

.docx   A METHOD OF TRACING INTRUDERS BY USE OF MOBILE AGENTS.docx (Size: 70.76 KB / Downloads: 70)


Presented By:
A. Meiappane 1 A. Martin 2 J.Madhusudanan 3 T. Miranda 4 K.Meenakshi 5
1 SL, Department of IT, SMV Engineering College, Pondicherry, India
2 SL, Department of IT, SMV Engineering College, Pondicherry, India
3 SL, Department of IT, SMV Engineering College, Pondicherry, India 4 Lecturer, Dept. of CS&A, , St.Joseph's College, Cuddalore, India
5 Student of MCA, SMV Engineering College, Pondicherry, India


A network intrusion detection system (IDA) retrieves information related to intrusions from target systems across the network by using mobile agents. Simultaneously, the agents trace the intruders. IDA detects intrusions based on information collected and the route of intrusion. This paper mainly describes how IDA retrieves the information and traces the intrusions.


Computer break-ins are mainly divided into two types: break-ins from outside the local area network (LAN) and those from inside LAN. However, it is rare in either case that intruders directly attack the target host from their own hosts. The reason for this is logical: intruders desire to conceal their origin. Intruders tend to attack the less -protected hosts first, gradually approaching hosts armed with stronger protection, ultimately working up to and reaching their target hosts. Commonly, administrators not only on the target hosts but also on the intermediate hosts do not notice the intrusion. Furthermore, the administrators cannot trace the origin of an intrusion after the network connection has closed even if the intrusion has been detected.
At the Information-technology Promotion Agency (IPA) in Japan, we have been developing a network intrusion detection system (IDS) called the Intrusion Detection Agent system (IDA), which employs mobile agents toward the goal of avoiding some of the problems experienced by conventional IDSs. IDA has a function by which mobile agents trace intruders, collecting information related only to the intrusion along the intrusion-route, and decide whether, in fact, an intrusion has occurred. These functions enable efficient information retrieval, and also make it possible to detect compromised intermediate hosts. Furthermore, IDA detects intrusions based on a new intrusion detection model, with features distinct from those of the conventional one. Consequently, IDA reduces the overhead of the system and detects some new and unknown forms of attack.
This paper describes how the mobile agents in IDA trace intrusions and gather information. We propose a method of information exchange and tracing intrusion by means of mobile agents. Section 2 describes the structure and action of IDA. Section 3 describes the bulletin board and message board by which mobile agents exc hange information. Section 4 describes the implementation and evaluation of IDA. Section 5 outlines our conclusions and indicates the direction of our future work.

2.1. Current Intrusion Detection Systems
Many current intrusion detection systems are based on Denning's intrusion detection model[2,3], in which audit records, network packets, or any other observable activity serves as the basis for detecting abnormalities in the system or checking them with traces and signals of known intrusion patterns. The methodology by which intrusions are detected can be divided into the following two categories[4]:
? Anomaly Intrusion Detection ? Misuse Intrusion Detection

An anomaly intrusion detection system records users' activities on the systems and builds statistical profiles of the activities from these records. It regards activities that differ remarkably from normal use as intrusions. Misuse intrusion detection refers to intrusions that follow well-defined intrusion patterns , and these can be written into the system in advance.
Since misuse intrusion detection will not work against new or unknown forms of attack, and anomaly intrusion detection is ineffective in detecting insider attacks, any intrusion detection system that employs only one of these methods will have a limited range of intrusions it can detect. Intrusion detection systems that intend to avoid these pitfalls usually involve concurrent employment of both misuse and anomaly techniques. However, the anomaly intrusion detection portion of the system is still large and slow; as a result, it is often impractical for an average site to use an IDS that employs both techniques. The current trend of research in IDS is not toward detecting many intrusions efficiently but toward detecting almost all intrusions precisely.

In developing IDA, we propose a new intrusion detection model in place of Denning's model. IDA will concomitantly reduce the overhead of the system and detect new or unknown forms of attack. Our goal is not to detect all intrusions precisely but to detect many intrusions efficiently. To accomplish this goal, IDA works by watching events that may relate to intrusions -¬Marks Left by Suspected Intruder, referred to by the acronym MLSI in our model -- instead of analyzing all of the users' activities. If an MLSI is found, IDA will gather information related to the MLSI, analyze the information, and decide whether or not an intrusion has occurred. For example, IDA monitors whether or not critical files related to system security have been modified, since, in many cases, intruders tamper with them. However, because legitimate users may also change the files, the system cannot conclude solely on the basis of file modifications that an intrusion has occurred. IDA therefore gathers further information related to the modification of the file before deciding if an intrusion has occurred. We refer to the additional information gathered as "information related to MLSI."

2.2. Structure of IDA

In many conventional network intrusion detection systems, each target system transfers its system log to an intrusion-detection server, and the server analyzes the entire log in search of intrusions. Methods of this kind fall under the client/server paradigm. In a large-scale network deploying an intrusion detection system, network traffic will be extremely high, since the volume of the system logs that are routinely transferred is very large, though most of it has no information related to intrusions. Therefore, this type of intrusion detection system on a large-scale network does not fulfill its function efficiently. To solve this problem, we adopted a mobile-agent paradigm in developing IDA. Mobile agents autonomously migrate to target systems to collect only information related to intrusions, eliminating the need to

transfer system logs to the server. We can deploy IDA on a local area network, the protocol of which is TCP/IP. IDA consists of a manager, sensors, bulletin boards, message boards, tracing agents, and information-gathering agents. The system details are as follows (Figure 1 ).
Target A Target E
KB: Bulletin Board
MB: Message Board
TA: Tracing Agent
IA: ln£orjnation_gathering Agent

Fig. 1: Structure of IDA
Manager: The manager analyzes information gathered by information-gathering agents (which are described below) and detects intrusions. It manages the mobile agents and bulletin boards (also described below) and provides an interface between administrators and the system. The manager accumulates and weighs the information entered by the mobile agents on the bulletin board, and if the weights exceed a set threshold, the manager concludes that an intrusion has occurred. One manager resides on each network segment.
Sensors : The sensors, present on each target system, monitor system logs in search of MLSIs. If a sensor finds an MLSI, it reports this finding to the manager. The sensor also reports on the type of MLSI.
Tracing agent: The intrusion-route tracing agent, called simply the tracing agent, traces the path of an intrusion and identifies its point of origin: the place from which the user leaving an MLSI remotely logged onto the target host. En route to finding the origin, a tracing agent can find any intermediate nodes that may be compromised.

The manager, sensor, and tracing agent work together in the following way. First, the sensor detects an MLSI and reports it to the manager, then the manager launches a tracing agent to the target system. The tracing agent migrates autonomously from machine to machine and traces the intrusion independently, without the manager.

When many MLSIs are found by a single target system in different sessions over a short period of time, many tracing agents corresponding to the MLSIs are launched into the target system. A tracing agent makes no judgments about intrusions, and is not capable of deciding whether or not an intrusion has occurred. A tracing agent can migrate to any system in which IDA is installed.

Information-gathering agent: An information-gathering agent, which is mobile, gleans information related to MLSIs from a target system. Each time a tracing agent in pursuit of an intruder is dispatched into a target system, it activates an information-gathering agent in that system. Then the information-gathering agent gleans information depending on the type of MLSI, returns to the manager, and reports.

If the tracing agent migrates to another target system, it will activate another information-gathering agent, which will gather information on the next target system. Many information-gathering agents may be activated by many different tracing agents on the same target system. An information-gathering agent is not capable of deciding whether an intrusion has occurred.

Bulletin board and message board: The bulletin board and the message board are a common use area that can be accessed by tracing agents and information-gathering agents, and a means of information exchange. There is a message board on each target system, used by tracing agents for exchanging information; any tracing agent can know whether a track under its scrutiny has already been traced by other agents, and can use this information in deciding where to go. The bulletin board is on the manager-machine and is used for recording information gathered from target systems by information-gathering agents, as well as for integrating the information gathered about every tracing route.
2.3. Action of IDA

Here we outline how IDA works after a sensor detects an MLSI on a target system. IDA accumulates the data required by intrusion-route tracing (i.e., about network connection, the various processes running on the system, etc.) on each target system in advance. & Each sensor on the target system seeks an MLSI from the system log.
& If the sensor detects an MLSI, it is reported to the manager.
& The manager dispatches a tracing agent to the target system where the MLSI was detected.
& The tracing agent arrives at the target system and activates an information-gathering agent.
& The information-gathering agent collects information related to the MLSI on the target system.
& After activating the information-gathering agent, the tracing agent investigates the point of origin of the MLSI in an effort to identify the user's remote site. The tracing agent can derive this from the accumulated data about network connection and processes running on the system.
& After collecting information, the information-gathering agent, independent of the tracing agent, returns to the manager, and enters the information on the bulletin board.
& The tracing agent moves to the next target system on the tracing route, and it activates a new information-gathering agent.
& If the tracing agent arrives at the origin of the route, or cannot move anywhere, or if other tracing agents have chased the route it could follow, it returns to the manager.

In cases where a sensor detects many MLSIs on a target system occurring over a short period of time, or if sensors detect MLSIs on many target systems, IDA works as described above for all MLSIs detected.

3.1. Purpose of the Bulletin Board and the
Message Board

In IDA, the manager dispatches a tracing agent to a target system and, because of the mobile agent's autonomy, subsequently has no concern with the migration of the tracing agent. Many tracing agents may therefore trace the same intrusion, since the manager does not centrally control their respective migration. To avoid this overlapping, tracing agents exchange information with each other regarding their respective pursuits. Tracing agents employ the message board on a target system for this exchange of information.

The bulletin board on the manager-machine, on the other hand, contains information brought to the manager by the information-gathering agents that have been activated by the tracing agents. Each information-gathering agent brings information to the manager independently, and, as a result, this information concentrated in the manager is not arranged by intrusion-route. The bulletin board on the manager-machine functions as a clearinghouse, where this unorganized mass of information can be arranged by intrusion-route for the manager's analysis.
3.2. The Message Board

As explained above, tracing agents employ the message board on the target system in order not to overlap their respective trace routes. A tracing agent begins to trace from the point in a target system where an MLSI is first detected. If a user who leaves the MLSI leaves another MLSI on his or her way to the target, another tracing agent will be dispatched. For example, suppose user X remotely logs onto target systems A, B, C, and D in this order: A - B - C - D. User X compromises the systems, and MLSIs are detected on targets D and B respectively. The sensors of D and B report to the manager independently, and the manager dispatches tracing agents to both targets D and B. The tracing agent Dag traces intrusions in the following order: D - C - B - A. Tracing agent Bag, on the other hand, traces in the following order: B - A. The two agents' tracings therefore overlap on B - A (Figure 2).

Fig. 2: Overlap Trace

The tracing agents determine their paths and destinations by use of a message board as explained below.

gi A tracing agent that is dispatched to a target system uses the process ID and user ID to trace a process that
has left an MLSI.
gi If the tracing agent detects that the user who has left MLSIs logs on to the target system remotely, then the agent determines its destination from information about the user's login session.
gi The tracing agent refers to the message board on the target system.
gi If there is no information on the message board pertaining to the login session that the agent intends to trace, the tracing agent then enters such information and moves onto the target system from which the user logged on.
gi If there already exists on the message board information related to that session, meaning that another agent has already traced this particular user, then the tracing agent enters its reference on the message board and returns to the manager.
gi If Step 4 (rather than Step 5) has been followed, and it turns out that the target system being traced is the origin of the intrusion, the tracing agent returns to the manager. If not, the agent repeats Steps 1 - 6.

The list below describes the information entered by tracing agents on the target system message board in order to avoid trace overlapping.

gi Name of the following system
gi Process ID in the following system
gi Time stamp when the user logs onto the target system
gi Process ID leaving the MLSI, or the name of the target system where the tracing agent begins the trace
gi Tracing agent's ID
gi Time stamp when the agent begins the trace

If the tracing agent decides to discontinue a trace, it enters its ID and the time stamp on the message board. In this case, when the agent returns to the manager, it brings a log of its tracing route and the reason for its return.

There are three possible reasons for a tracing agent's return.

gi It cannot trace an intrusion because IDA is not installed on the following system, etc.
gi The system is the origin of the intrusion
gi Another agent is tracing or has traced the intrusion
If it turns out that another agent is tracing or has traced the intrusion, the tracing agent in question also brings the agent's ID and the name of the following system to the manager.
3.3. Integration of Information
The manager judges whether or not an intrusion has occurred on the basis of information gathered by the information-gathering agents. The manager does this by evaluating the information entered onto the bulletin board on the manager-machine. It evaluates not only each bit of information but also the information on each intrusion-route as a whole. Below, the method by which a manager integrates information and categorizes it by intrusion-route is described.
& An information-gathering agent returns to the manager after it has completed its task of gathering information related to intrusions on a target system. The agent then checks the bulletin board on the manager for information gathered by other information-gathering agents that were activated by the same tracing agent.
& If no information has been gathered and posted by other information-gathering agents activated by the same tracing agent, the information-gathering agent in question enters its information on the bulletin board. When the agent enters the information, the manager weighs and evaluates the information.
& If any information has been gathered and posted by other information-gathering agents activated by the same tracing agent, the information-gathering agent enters its information onto the bulletin board and appends it to the other agents' information, in the order in which the tracing agents traced the intrusion (Figure 3). At this time, the manager again evaluates all information accumulated in the appended information-list, and decides whether an intrusion has occurred.

Thus, information gathered by information-gathering agents activated by the same tracing agent will be integrated into a single set of information in the order it was found along the intrusion-route. Beyond this method, however, if many tracing agents trace the same intrusion, the manager integrates the information as described below.
& If a tracing agent X requests another tracing agent Y to trace an intrusion, X brings the information about Y to the manager. X appends the list of information gathered by the previous information-gathering agents that it activated (X's information-list) to Y's information-list (Figure 3). As a result, the two information-lists will be integrated, and the manager again evaluates all information in the appended, cumulative information-list.

The information entered by information-gathering agents in the bulletin board on the manager is as follows:

? ID of the tracing agent
? The name of the target system where information was gathered
? The name of the target system preceding the target where information was gathered
? Information gathered on the target system (refer to

4.1. Implementation
4.1.1 Definition of MLSIs and information-gathering
We divided intrusions into two patterns: remote attacks and local attacks. A remote attack is any attack that is initiated against a machine to which the attacker does not currently have access. A local attack is any attack that is initiated against a machine to which the attacker already has access. We are now implementing IDA and have completed the local-attack detection mechanism in IDA. Prior to implementation, we investigated patterns of Internet intrusions, and it was revealed that the patterns of most local attacks involve start up of an unauthorized root shell and modification of critical files related to system security. Therefore we define MLSIs as in local-attack detection, and the sensors monitor these features on each target system. & start up of root shell and
& modification of critical files such as /etc/passwd, /etc/shadow, /etc/hosts.equiv, and /.rhosts Moreover, information-gathering on the target machine where the MLSI was left is based on the definition of MLSIs. Information-gathering for the first MLSI includes whether the user who caused the MLSI issued the "su" command or not, and that for the second MLSI includes the following:
? issues the suid command
? links the symbolic link to the target file
From the event log, IDA detects an intrusion that occurred before the MLSI triggered. This means that after
the MLSI the manager can detect intrusions without analyzing any event on the target systems.

4.1.2 Environment

Over the course of IDA development, the function of local-attack detection and intrusion-route tracing in local area networks has been completed. We created a developing environment of IDA as described below. g Hardware
Sun SS10, Ultra5, Ultra10, Ultra30
g Operating System Sun Solaris2.5.1
g Languages
g GNU C/C++
g perl 5.004.01
g D'Agent 2.0[5]
g Auditing
Sun Solaris BSM[6] (Basic Security Module)
In IDA, mobile -agents are written by D'Agent, which offers PGP, and this is able to authenticate and encrypt the mobile agents[7].

4.2. Experiment and Evaluation
4.2.1 Local-Attack detection

The goal of IDA is not to detect all intrusions but to detect as many as possible efficiently and with precise intrusion-route tracing. Since many Internet intrusions occur by means of cracking tools distributed on the Internet, it would be appropriate to evaluate the efficacy of IDA against these cracking tools. We obtained cracking tools aimed at local attacks on the Internet, and classified them, and simulated IDA attacks by use of these tools. Our classification (see below Figure 4) is a limited examination of the trend of cracking tools because we could not obtain all cracking tools available. We attack IDA by use of these tools, which can run on Sun Solaris 2.5.1, and found that, within the limits, IDA can detect a local attack with the tools tested 92.3% (12/13 simulations).
4.2.2 Mobile Agent Performance

To establish agent performance, it is important for the IDA to determine how many MLSI triggers occur, since the number of MLSIs should be the same as the number of tracing agents activated on the manager. We investigated the rate of MLSIs in our developing environment, and found that the MLSIs triggered at the rate of 0.024% in whole events (22/89742) per a day. The machine investigated is a mail server in an IDA project and implimentation, also used in developing IDA, which has six users.

The average size of a tracing agent is 4.2K bytes, which of information-gathering agents without information are 2.1K bytes and 2.4K bytes with information. We measured the time period from when a sensor triggers to when the tracing agent related to that MLSI returns to the manager in each case of the number of target systems contained in an intrusion route. We measured this time period in the case of authenticating agents. With authenticating and encrypting, it takes about one and a half times as long as only authenticating. This time includes all processes of the tracing agent on each target system. The time period of an agent's transportation between targets is very short, often less than 0.1 second. The results are shown in the following Table 1.

Number of Machine Round-Trip Time (sec)
1 7.194
2 11.120
3 16.002
4 20.736
5 28.054

We have described how mobile agents gather information and trace an intrusion in IDA. IDA does not indiscriminately gather information from the entire network, but gathers information only related to the MLSI by tracing the user who has left it behind. Therefore, information does not bombard a manager indiscriminately, but is already arranged by intrusion-route. As a result, the manager need not organize information. Given that IDA does not gather information unrelated to intrusions, the amount of information concentrated in the manager will be reduced by using this system. Moreover, if IDA cannot detect an intrusion in one of the target systems on an intrusion-route, e.g., target system A, but detects intrusions in other target systems along the same route, it will conclude that an intrusion has occurred in A. In other words, if IDA fails to detect an intrusion directly on a target, it may ultimately detect it indirectly from information gleaned from other targets on the same intrusion-route. In this way, IDA is able to detect intrusions on intermediate nodes along an intrusion-route.

[1] W. R. Cheswick, and S. M. Bellovin, "Firewalls and nternet Security: Repelling the Wily Hacker,'' Addison Wesley Publishing Company, 1994.
[2] D. E. Denning, "An Intrusion-Detection Model,'' IEEE Transactions on Software Engineering, Vol. SE-13. No. 2, pp. 222-232, 1987.
[3] S. Kumar, "Classification and Detection of Computer
Intrusions,'' Department of Computer Sciences, Purdue
University, Ph.D. Dissertation, 1995.
[4] S. Kumar and E. Spafford, "An Application of Pattern Matching in Intrusion Detection,'' Technical Report 94¬013, Purdue University, Department of Computer Science,
[5] R. Gray, D. Rus, and D. Kotz, "Transportable Information Agents,'' Technical Report TR96-278, Department of Computer Science, Dartmouth College, 1996. http://cs.dartmouth.edu/~agent/
[6] "SunSHIELD Basic Security Module Guide,'' Part
No:802-1965-10, Revision A, Sun Microsystems,Inc.
[7] R.Gray, David Kotz, George Cybenko, and Daniela Rus, "Security in a multiple-language mobile-agent system,'' in Giovanni Vigna, editor, Lecture Notes in Computer Science: Mobile Agents and Security, 1998. To appear http://actcomm.dartmouth.edu/~rgray/#papers


Area of
Interest: Enterprise class Multi-tiered Distributed
Components Applications, Data Mining &
Warehousing. Work Experience: Teaching
Experience; Nearly four years of teaching
experience in the Master of Computer Science &
Applications. College :Sri Manakula Vinayagar
Engineering College, Pondicherry. Designation:
Assistant Professor. (May 2002 to till date).
Software Development Experience. Nearly three
and half years of experience in the Information
Technology and worked in Java Internet
Technologies. Organization: Maan Sarovar
Software Private Ltd., Chennai. Designation:
Software Programmer. Educational
Qualification: Master of Philosophy in Computer Science (M.Phil in CS) from Bharathidasan University. Master of Computer Applications (MCA) from Bharathidasan University, Post Graduate Diploma in Business Administration (PGDBA) from Pondicherry University ,Graduate in Chemistry (B.Sc) from St. Joseph's College, Cuddalore.Certification: Brain bench certified Java2 Programmer with score 3 out of 5
(Pin Number-2032399).


Area of Interest: Data Base Management System.Experience:Two years and seven months of teaching experience in the Master of Computer Applications Department College: Sri Manakula Vinayagar Engineering College, Pondicherry. Designation:
Sr.Lecturer. (SEP'2005totill date), Designation: Lecturer. (SEP' 2002 to AUG'
2004).Educational Qualification: Master of Computer Applications with first class from Pondicherry University Passed out on April 2002 with 7.59/10(CGPA).Graduate in Computer Science with first class from E.G.S.Pillay Arts & Science College, Nagapattinam Passed out on
April 1999 with 69.4%..

Area of Interest: Software Agents and its Applications. Teaching Experience: Nearly four years of teaching experience in the Master of Computer Science & Applications College: St. Joseph's College of Arts and Science, Cuddalore. Designation: Lecturer. Educational Qualification: Master of Philosophy in Computer Science (M.Phil in CS) from Azaghapha University.Post Graduate in Computer Science (M.Sc) from St. Joseph's College, Cuddalore.Graduate in Computer Science (B.Sc) from St. Joseph's College, Cuddalore.
A. Meiappane

. Area of Interest: Object Oriented analysis and Design, Operating

System .Career Profile: Working as an Assistant Professor in Sri Manakula Vinayagar K_H Engineering College, Madagadipet - Pondicherry from September 2004 to till date. Professional Qualification: M.Tech. - Information Technology from Punjabi University, Patiala MCA - Master of Computer Applications from Bharathiyar College of Engg. & Tech., Karaikal, affiliated to Pondicherry Central University, Pondicherry.


Area of Interest: Operating systems, Educational Qualification: Pursuing III semester of Master of computer applications with 78.43%(up to II semester) at Sri Manakula Vinayagar Engineering College, Pondicherry. Graduate in Physics with first class and distinction from Bharathidasan government arts and science college for women, affiliated to Pondicherry University with 85.01% . (Passed out on May -
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: st josephs college of arts science autonomous cuddalore, bsc result, punjabi university patiala,
Popular Searches: counting people tracing gsm bts, network based tracing traitor mini project, lip tracing matlab code, intruders seminar, program to show the use of dynamic method dispatch, newspaper advantages in punjabi, qualification of sdo harayana,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  web spoofing full report computer science technology 13 8,857 20-05-2016, 11:59 AM
Last Post: Dhanabhagya
  advantages and disadvantages of mobile phones in telugu jaseelati 0 195 07-02-2015, 02:21 PM
Last Post: jaseelati
  mobile phone based attendance tracking system ppt jaseelati 0 294 30-01-2015, 01:57 PM
Last Post: jaseelati
  mobile advantages and disadvantages in hindi wikipedia jaseelati 0 585 29-01-2015, 01:49 PM
Last Post: jaseelati
  mobile data internetworking standards jaseelati 0 300 29-01-2015, 01:15 PM
Last Post: jaseelati
  difference between soc and aoc in mobile computing jaseelati 0 310 20-12-2014, 01:12 PM
Last Post: jaseelati
  online voting using bluetooth enabled mobile phone projec jaseelati 0 322 09-12-2014, 03:21 PM
Last Post: jaseelati
  online voting using bluetooth enabled mobile phone jaseelati 0 314 29-11-2014, 04:47 PM
Last Post: jaseelati
  android full report computer science technology 57 73,046 24-09-2014, 05:05 PM
Last Post: Michaelnof
  steganography full report project report tiger 23 25,691 01-09-2014, 11:05 AM
Last Post: computer science crazy