Performance Analysis of Classification Techniques by using Multi Agent Based Intrusion Detection System

Full Text (PDF, 507KB), PP.17-24

Views: 0 Downloads: 0


Aumreesh Kumar Saxena 1,* Sitesh Sinha 1 Piyush Shukla 2

1. CSE Dept, AISECT University Bhopal, MP, India

2. CSE Dept. UIT RGPV Bhopal, India

* Corresponding author.


Received: 22 Sep. 2017 / Revised: 21 Oct. 2017 / Accepted: 7 Nov. 2017 / Published: 8 Mar. 2018

Index Terms

Intrusion, Security, Intrusion Detection System, System, Network, Attack, Agent, Classification


In this paper we have designed Agent based intrusion detection system (ABIDS) where agents will travel between connected client systems from server in a client-server network. The agent will collect information from client systems through data collecting agents. It will then categorize and associate data in the form of report, and send the same to server. Intrusion detection system (IDS) will support runtime addition of new ability to agents. We have illustrated the design of ABIDS and show the performance of ABIDS with various classification techniques that could produce good results. The motive of the work is to examine the best performance of ABIDS among various classification techniques for huge data. Moreover sophisticated NSL KDD dataset are used during experiments for more sensible assessment than the novel KDD 99 dataset.

Cite This Paper

Aumreesh Kumar Saxena, Sitesh Sinha, Piyush Shukla, "Performance Analysis of Classification Techniques by using Multi Agent Based Intrusion Detection System", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.3, pp.17-24, 2018. DOI:10.5815/ijcnis.2018.03.03


[1]Jitendra S Rathore, Praneet Saurabh, Bhupendra Verma “AgentOuro A Novelty Based Intrusion Detection and Prevention System” Computational Intelligence and Communication Networks (CICN), Fourth International Conference, India, Pp: 695 – 699, Nov. 2012.
[2]Audrey A. Gendreau; Michael Moorman “Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things” 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Austria, Pp 84 - 90, Sep-2016.
[3]Firkhan Ali Bin Hamid Ali and Yee Yong Len “Development of Host Based Intrusion Detection System for Log Files” IEEE symposium on business, engineering and industrial application (ISBEIA) langkawi, malaysia Pp: 281-285, Dec. 2011.
[4]Djemaa, B.; Okba, K. “Intrusion detection system: Hybrid approach based mobile agent “IEEE International Conference on Education and e-Learning Innovations (ICEELI), Pp 1 – 6, 2012.
[5]Ashutosh Gupta, Bhoopesh Singh Bhati, Vishal Jain, “Artificial Intrusion Detection Techniques: A Survey”, IJCNIS, vol.6, no.9, pp.51-57, 2014. DOI: 10.5815/ijcnis.2014.09.07
[6]S Khanum , M Usman and A Alwabel “Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks” IJCSI International Journal of Computer Science Vol. 9, Issue 1, No 3, Pp 101-109, 2012.
[7]S. Ganapathy,* P. Yogesh, and A. Kannan “Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM” Hindawi Publishing Corporation Computational Intelligence and Neuroscience Volume 12, Pp 1-10, 2012.
[8]J Sen “A robust and fault-tolerant distributed intrusion detection system” 1st International Conference on Parallel Distributed and Grid Computing (PDGC), Pp 123-128, 2010.
[9]N.Jaisankar and R.Saravanan K. And Durai Swamy “Ntelligent Intrusion Detection System Framework Using Mobile Agents” International Journal Of Network Security & Its Applications (Ijnsa), Vol 1, No 2, Pp 72-88, 2009.
[10]S A Onashoga, A D Akinde, and A S Sodiya “A Strategic Review of Existing Mobile Agent Based Intrusion Detection Systems” Informing Science and Information Technology Volume 6, Pp 269-282, 2009.
[11]M A Shibli And S Muftic “Intrusion Detection And Prevention System Using Secure Mobile Agents”, IEEE International Conference On Security And Cryptography, Pp. 76‐82, 2008.
[12]A Mokarian, A Faraahi, A G Delavar- “False Positives Reduction Techniques in Intrusion Detection Systems-A Review” IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.10, Pp 128-134, 2013.
[13]P Kannadiga and M Zulkernine- “DIDMA: A Distributed Intrusion Detection System Using Mobile Agents” Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN’05) Pp 1-8, 2005.
[14]Y Wang, SR Behera, J Wong, G Helmer, V Honavar, L Miller, R Lutz , M Slagell- “Towards the automatic generation of mobile agents for distributed intrusion detection system” The Journal of Systems and Software 79, Pp:1–14, 2006.
[15]Safuan, H.; Cheah, Z.B. ; Lim, H.W.; Chin, J.H. “Intrusion detection system based on mobile agent” Computers, Communications, & Signal Processing with Special Track on Biomedical Engineering. 1st International Conference on 14-16 Nov. Pp: 266 – 270, 2005.
[16]Bilal Maqbool Beigh,"A New Classification Scheme for Intrusion Detection Systems", IJCNIS, vol.6, no.8, pp.56-70, 2014. DOI: 10.5815/ijcnis.2014.08.08.
[17]G Ramachandran and D Hart “A P2P Intrusion Detection System based on Mobile Agents” ACME ’04, April 2-3, Huntsville, Alabame, USA Pp:186-190, 2004.
[18]S Fenet, S Hassas “A distributed Intrusion Detection and Response System based on mobile autonomous agents using social insects communication paradigm” Electronic Notes in Theoretical Computer Science, Volume 63, Pp: 41-58. 2002.
[19]N. B. Anuar, H. Sallehudin, A. Gani, O. Zakari, “Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree”, Malaysian journal of Computer Science, Vol. 21(2), 2008.
[20]C. Xiang, P.C. Yong, L.S. Meng, “Design of multiple-level hybrid classifier for intrusion detection system using bayesian clustering and decision trees”, Pattern Recognition Letters 29, 2008.
[21]Janhavi Kaskar, Ruchit Bhatt, Rohit Shirsath “A System for Detection of Distributed Denial of Service (DDoS) Attacks using KDD Cup Data Set “ (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), Pp: 3551-3555, 2014.