Main Article Content

Abstract

Protection of agent data state and partial results in mobile agent systems continues to draw research
interest. Today hackers disguise their attacks by launching them form a set of compromised hosts distributed
across the Internet. It is very difcult to defend against these attacks or to track down their origin. Commercially
available intrusion detection systems can signal the occurrence of limited known types of attacks. New types of
attacks are launched regularly but these tools are not effective in detecting them. Human experts are still the key
tool for identifying, tracking, and disabling new attacks. Often this involves experts from many organizations
working together to share their observations, hypothesis, and attack signatures.
.
Keyword: agent, intrusion detection, network

Article Details