Journal of Systems Engineering and Electronics ›› 2007, Vol. 18 ›› Issue (4): 785-794.

• SOFTWARE ALGORITHM AND SIMULATION • Previous Articles     Next Articles

Multi-agent cooperative intrusion response in mobile adhoc networks

Yi Ping1,2, Zou Futai1, Jiang Xinghao1 & Li Jianhua1   

  1. 1. School of Information Security Engineering, Shanghai Jiao tong Univ., Shanghai 200030, P. R. China;
    2. State Key Lab. of Information Security, Graduate School of Chinese Academy of Sciences, Beijing 100049, P. R. China
  • Online:2007-12-24 Published:2010-01-03

Abstract:

The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermeasures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions. the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation.