MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents

Abstract

In this paper, we propose MAMNID, a mobile agent-based model for networks incidents diagnosis. It is a load-balance and resistance to attack model, based on mobile agents to mitigate the weaknesses of centralized systems like that proposed by Mohamed Eid which consists in gathering data to diagnose from their collecting point and sending them back to the main station for analysis. The attack of the main station stops the system and the increase of the amount of information can equally be at the origin of bottlenecks or DDoS in the network. Our model is composed of m diagnostiquors, n sniffers and a multi-agent system (MAS) of diagnosis management of which the manager is elected in a cluster. It has enabled us not only to reduce the response time and the global system load by 1/m, but also make the system more tolerant to attacks targeting the diagnosis system.

Share and Cite:

T. Djotio Ndié, C. Tangha and G. Bertrand Fopak, "MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents," Journal of Information Security, Vol. 3 No. 4, 2012, pp. 281-294. doi: 10.4236/jis.2012.34035.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] W. Lee and S. Stolfo, “A Framework for Constructing Features and Models for Intrusion Detection Systems,” ACM Transactions on Information and Systems Security, Vol. 3, No. 4, 2000, pp. 227-261.
[2] K. Tabia, “Graphical Models and Behavioral Approaches for Intrusions’ Detection,” Ph.D. Thesis, University of Artois, Arras, 2008.
[3] M. Eid, “A New Mobile Agent-Based Intrusion Detection System Using Distributed Sensors,” American University of Beirut, Department of Electrical and Computer Engineering, Washington DC, 2004.
[4] G. B. Fopak, “MAMDIR: A Mobile Agent Model of Network Incidents Diagnosis,” Master 2 of Research Thesis, National Advanced of Engineering, Unviersity of Yaoundé 1, Yaounde, 2011.
[5] J. Ferber, “Multi-Agent Systems. An Introduction to Distributed Artificial Intelligence,” Addison Wesley, Boston, 1999.
[6] M. Tchikou, “A Multiagents Design Environment for the Piloting of Production Systems,” Master’s Thesis, University of Pau and Pays de l’Adour, France, 2004.
[7] G. Picard, “Development Methodology of Adaptative Multi-Agents Systems and Design of Software with Emerging Functionalities,” Ph.D. Thesis, University Paul Sabatier of Toulouse III, France, 2004.
[8] J. B. Voron, “Automatic and et Particularized Construction of Intrusion Detection Systems for Parallel Systems Based on Petri Networks,” Ph.D. Thesis, University Pierre et Marie Curie, France, 2009.
[9] S. F. Wu et al., “JiNao: Design and Implementation of a Scalable Intrusion Detection System for the OSPF Routing Protocol,” IEEE Workshop on Information Assurance and Security, West Point, June 2001, pp. 91-99.
[10] W. Emmerich, “Engineering Distributed Objets,” John Wiley & Sons Ltd., Chichester, 2000.
[11] J. P. Sansonnet, “Parallel Architectures Online Course,” 2011. www.limsi.fr/~/enseignementtutoriels/archi/archi.html
[12] D. E. Denning, “An Intrusion-Detection Model,” IEEE Transactions on Software Engineering, Vol. SE-13, No. 2, 1987, pp. 222-232.
[13] K. Boudaoud, “Networks Security Management: A New Approach by Multi-Agents System,” University of de Geniva, Geniva, 2001.
[14] Percher et al., “Intrusions Detection in Ad Hoc Network,” West Higher Ectronic School (ESEO), France, 2004.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.