• 1

    ..

  • 2

    ...

  • 3

    ...

Wednesday, 28 March 2012

DSP Related Websites - Materials

DSP Related Websites - Materials




Tuesday, 27 March 2012

A SNIFFER INTRUSION DETECTION SYSTEM BASED ON MOBILE AGENTS - PAPER


A SNIFFER INTRUSION DETECTION SYSTEM BASED ON MOBILE AGENTS
             
Abstract—In this paper, the tool “sniffer” is introduced and controlled as a sensor by the IDS via mobile agents; these agents gather intrusion detection data and send them back to the server for analysis. We propose a distributed intrusion detection system (DIDS) which detects intrusion from outside the network segment as well as from inside using mobile agents. The proposed model consists of three major components: Intrusion Detection Component,     Mobile Agent  Environment, Data    Analysis Component and distributed sensors residing on every device in the network segment. Compared with traditional central sniffing IDS  techniques,  the  system  shows  superior  performances  and saves network resources.

 Keywords: intrusion detection system(ids),distributed intrusion detection  system(dids),mobile agents.

   I.      INTRODUCTION
Among all security issues, intrusion is the most critical and widespread. Intrusion can be defined as an attempt to compromise or otherwise cause harm to a network. Intrusion detection involves the behavior of detecting unauthorized and malicious access network system.

Intrusion detection has become an extremely important feature of the defense-in-depth strategy. The thought used to be that if you had a firewall protecting your network you were secure. This is no longer the case. A firewall is an essential and important part of network security but it does not have the ability to detect hostile behavior. Unlike a firewall, an intrusion detection system has the ability to evaluate solitary packets and generate an alarm if it detects a packet with hostile potential. A distributed IDS (DIDS) consists of multiple Intrusion Detection Systems (IDS) over a large network, all of them communicate with  each  other,  or  with  a  central  server  that  facilitates advanced network monitoring, incident analysis, and instant attack data. By having these co-operative agents distributed across a network, incident analysts, network operations and security personnel are able to get a broader view of what is occurring on their network as a whole.

In addition to identifying attacks, IDS can be used to identify security vulnerabilities and weaknesses, enforce security  policies,  and  provide  further  system  auditing  by exploiting the logs/alerts from the output component of the IDS.

Agent is a software entity that functions continuously and autonomously in a particular environment, and is able to carry out activities in a flexible and intelligent manner that is responsive to changes in the environment [1]. So, agent can improve the means of applying detection techniques, for example,  agents could be deployed at different user computers to collect extra feature data and agents  could also provide an interface to user application systems for smooth integration. So, agents were applied in intrusion systems that could provide a good mechanism for implementation of detection algorithm on network-based application systems.

Mobile agents are intelligent program threads, its function were  continuously and  are  able  to  learn, communicate and migrate themselves from one host to another to gather information and perhaps perform specific tasks on behalf of user [2]. There are a number of possible advantages by using mobile code and mobile agent computing paradigms. This includes overcoming network latency, reducing network load, performing autonomous and asynchronous execution, and adapting          to         dynamic           environments  [3].       Moreover, implementation of mobile agents in languages such as JAVA provided mobile agent with system and platform independence and considerable security features, which are a necessity in intrusion detection systems [4].

This paper  mainly focuses on  building a  mobile  agent- based system for detecting intrusion in network-based application systems. It will provide an option for setting up a distributed network intrusion detection system by using open source tools including the intrusion detection software Snort. The tools sniffer and snort used as sensors to detecting intrusion. The specific objectives are as follows:

Step 1: A new mechanism was designed for acquiring extra data about user action from client machines or from access control module in server applications. It provides distributed IDS to reduce the congestion in the network. There are local processing units to analyze relevant data and send summaries of alerts to the main station.

Step 2: Current IDS [5] comprise many sensors distributed over the network and a centralized management station. These systems cause many bottlenecks and consume a lot of network
resources. In this paper, mobile agents are dispatched to hosts where they activate the sensor, process collected data, and send it to the main station, which signals the agents to either stop collecting data or continue, with possible changes to the collection frequency and context.


An intrusion detection system (IDS) monitors network traffic, suspicious activity and alerts the system or network administrator.  In   some   cases   the   IDS   also   respond   to anomalous or malicious traffic by taking action such as blocking the  user  or  source IP  address  from  accessing the network.

IDS come in a variety of “flavors” and approach the goal of detecting   suspicious   behavior   different   ways.   There   are network based (NIDS) and host based (HIDS) intrusion detection systems. Previous IDS use to detect based on looking for specific signatures of known threats, it is similar to the way antivirus software typically detects and protects against malware. Latter IDS detecting based on comparing traffic patterns against a baseline and looking for anomalies. The IDS simply monitor, alert and perform action in response to a detected threat.

The  intrusion  detection  technology  can  date  back  to
1980[6], it became a well-established research area after the introduction of the model [7] and the prototypes [8] [9]. These systems were centralized, a single machine monitors data flow at a strategic point in the network that collects and analyzes data from the log files. Once an intruder destabilizes the host, it was able to gain considerable access to the whole network. This limitation is the main vulnerability of currently implemented IDS.

Distributed IDS were introduced to overcome the weakness which mobile t agents are considered to play a prominent role in the implementation of such technologies. The architecture called Autonomous Agent  for  Intrusion Detection (AAFID) [10] describes a distributed intrusion detection system based on multiple independent entities. The proposed system allows data to be collected from multiple sources combining traditional host-based and network-based IDS. Several problems in this framework  including  scalability,  performance,  security,  and user interface. Agents could be added or removed dynamically from the system, whenever a new form of attack is identified, new specialized agents can be deployed into the system [11].

Subsequent work like [13], [14], or [12] present a fully distributed   architecture,   data   collection   and   information analysis are performed locally without referring to the central management unit. For instance, a system was proposed to imitate the function of natural distributed systems to achieve the efficiency found in natural systems [12]. In this system, the detection of an intrusion triggers or an alert pheromone (represented by mobile agents) that diffuses in the network searching for  antibody agents.  Mobile response agents (the lymphocytes) will migrate to the battlefield to initiate a defensive action.

III.      SYSTEM ARCHITECTURE
This part we present the architecture of our distributed IDS. The architecture consists of the following components: (1) an intrusion detection processor, (2) a mobile agent platform, and (3) distributed sensors. A high level view of the architecture is given in Figure 1.

A.   Data Flow Capture
As the main network node monitor, the Data Flow Capture network traffic which incoming monitors, it captures dump of data and sends to IDA for detecting intrusion, then, Data Analysis component to analyze and self-learning.

B.   Intrusion Detection Agent (IDA)
IDA is the most important component of the system. It is responsible for monitoring network segments (subnets), and acts as a central intrusion detection agent and data processing unit. The unit is placed on a node that entry into intranet to monitor network traffic for all devices on the segment. And it is setup to send alert in time, so that, checking the errant packets using rule sets when it enter into the segment. It’s main capabilities is detecting intrusion and judging whether the behavior   is   abnormal,   if   it   is   abnormal,   alerting   to Administrator or make some decisions.


Log files often are sent to the IDA (via mobile agents) for packet decoding and processing. The IDA monitors agent’s operate in the network and direct them to critical locations in the network if malicious behaviors were detected. In order to guarantee  proper  interaction  with  mobile  agents,  the  IDA should exchanges data and messages as well as commands with the Mobile Agent Environment (MAE). The IDA provides the following intrusion detection services:

•          Integrate  correlating data  sent  by  individual mobile agents to implement a multi-point detection, especially

to deal with distributed attacks coming from within the network.

•          Monitor is established connections within the network at low level by scanning packets.

•          Gathered evidence of the attacker’s behavior during the time window between the attack detection and the response.

•          Look for the exploitation of known vulnerabilities in the network by checking on local intrusion signatures such as files integrity and user behavior profiles.

C.   Mobile Agent Environment (MAE)
In this paper, a Mobile Agent Environment (MAE) could create, interpret, execute, transfer, and terminate (kill) agents. The platform is responsible for accepting requests sent by the IDP , generating mobile agents plus and sending them into the network to handle the tasks (to start sniffing activities within the local network, stop it when necessary, and send collected data back to the IDP for further analysis).

D.   Data analysis (DA)
The Data analysis component receives data delivered from mobile Agents and picks up the useful information, then it sends the useful data into the self-learning component of DA. The self-learning component implements the SOM arithmetic to further deal with the data to process the abnormal intrusion.

E.   Sensors (Sniffer)
A sniffer [17] is a device used to deploy at entrance of networks to allow an application or hardware device to monitor on network traffic. The traffic with protocol can be IP, IPX etc. network packets. In general, sniffing is used for: (1) Network analysis and troubleshooting, (2) performance analysis and benchmarking, (3) monitoring for not encrypted text-based passwords and other interesting tidbits of data. Depending on the IDA’s instructions, the agent could run the sniffer for a predetermined period of time, collect the data, and send data in one batch to the IDP. Alternatively, it also could run the sniffer and send data as it is captured to the IDP until it receives instructions to stop sniffing.

F.   Working principle
Once the system is beginning started, the IDA starts its own sniffer and sends a ‘START’ request to the MAP. The message specifies the number of agents to be launched, and the corresponding IP address is set where each agent expect is visited. This implies that the IDP has a registry containing all IP addresses in the local network. The MAP, in turn, creates the agents and dispatches them into the network. Now assume that an agent on its trip sends a report to the IDP that it trigger an alarm. The IDA will send a ‘LUDGE’ message to the agent causing it to reactivate the sniffer at its current location and stay there, in an effort to gather more evidences on the current attack in order to study the behavior. The IDA will prompt the MAP to create a new agent that will takeover the agent’s task. In this scenario, the number of active sniffers may increase to form an alert stage to faster reaction.

IV.       EXPERIMENTAL RESULTS AND ANALYSIS

A.   Experimental preparations
In this paper, an ameliorative IDS has been implemented by Snort [15] and a mobile agent system that was created locally. Snort is a lightweight, full-fledged open-source network based IDS (NIDS) that has many capabilities such as packet sniffing, packet  logging  and  intrusion  detection  [17].  Snort  is  a signature-based IDS  that  uses  rule-sets  to  check  for  errant packets crossing a node in the network. A rule is a set of requirements that will trigger an alert. Snort was chosen as the NIDS because of its availability, ease of configuration and customization.

MORPHEOUS [18] is a prototypical mobile agent system that was developed as a final year project at the American University of Beirut. The Mobile Agent System was chosen as IDS platform because of its availability, easily running, and support for mobile agents. It consists of four entities: agent factory (AF), listeners, officer agents (OA), and soldier agents (SA). The core of this agent system is AF. It accepts request by the network users (in the case of the Snort requests), generates mobile agents and sends them to the network in order to deal with the special tasks. On the AF host, many officer agents reside to keep track of the dispatched agents (Soldier Agents) over the network and the data fetched by these agents. The last one is the listener, which is a small program that will reside in every host in the network and will be responsible for accepting, running, and deleting SA.

Data Analysis (DA) with a function component is a SOM training procedure. In SOM, the traditional back-propagation learning rule is unsupervised learning. While the multilayer feedforward network is trained, the hidden-unit activations of the feedforward network are used as training material for the accompanying Self Organizing Maps. After a few training cycles, the maps are developed in a certain extent. The information in   the maps is used in updating the connection weights of the feedforward network. The clustering effect is obvious during SOM learning, hidden-unit activations of patterns and associated with the same class. Results on classification effects show that the SOM architecture and learning rule offer a strong alternative for training multilayer feedforward networks with back-propagation.

In experiment, TcpDump is implemented to the WinDump [19] which is the porting to windows platform. It runs on all the operating systems supported by WinPcap, i.e. window XP. It was selected in the system because of its lightweight, popularity, support of multiple operating system and ability to dynamically reconfigure its execution state.



V.         CONCLUSION
In this paper, a model for Distributed Intrusion Detection System based on mobile agents was presented. In the system we bring in the tool “sniffer” and the open source tool “snort” to implement our prototype system. After many experiments we found that it is superior performance based on sort intrusion detestation. Also in the system we use the SOM feed forward network architecture to find new type attacks. In the future, we will pay more time for promoting new type of attacks.


REFERENCES
[1]    J. M. Bradshaw. “An introduction to software agents”,  Software Agents, chapter 1. AAAI Press/The MIT Press, 1997.
[2]    Stefan  Fuenfrocken.  “How  to  Integrate  Mobile  Agents  into  Web Servers”, Technical   Report,   Department   of   Computer   Science, Darmstadt  University  of  Technology,   Alexanderstr.  10,  D  64283
Darmstadt, Germany
[3]    Wayne Jansen, Peter Mell, Tom Karygiannis, Don Marks. “Applying Mobile Agents to Intrusion Detection and Response”,   NIST Interim Report (IR) - 6416. ACM October 1999.
[4]    Stefan Fuenfrocken. “Integrating Java-based Mobile Agents into Web Servers under Security Concerns”, Technical Report, Department of Computer Science, Darmstadt University of Technology, Alexanderstr.
6, 64283 Darmstadt, Germany.
[5]    Rajeev   Gopalakrishna,   Eugene   H.   Spafford.   “A   Framework   for Distributed Intrusion Detection using Interest Driven Cooperating Agents”,  Purdue University, 2001.
[6]  J.  P.  Anderson.  “Computer  Security  Threat  Monitoring  and Surveillance”,      Technical   report,   James   P   Anderson   Co.,   Fort Washington, PA, Arpil 1980.
[7]    D. E. Denning. “An intrusion-detection model”, In proceeding of the
IEEE Symposium on Security and Privacy, pages 118-131, April 1986.
[8]    D. S. Bauer and M. E. Koblentz. “NIDX – an expert system for real-time network   intrusion   detection”,   In   Proceeding   of   the   Computer Networking Symposium,  pages 98-106, Washington, DC, April 1988
[9]    R. Schoonderwoerd, O. Holland, and J. Bruten. “Ant-like agents for load balancing in telecommunications networks”,  In Proceedings of the first International Conference on Autonomous Agents, 1997.
[10] Jai Sundar Balasubramaniyan, Jose Omar Garcia-Fernandez, David Isacoff, Eugene Spafford, Diego Zamboni. “An Infrastructure for Intrusion Detection using Autonomous Agents”,   COAST technical Report 98/05, June 11, 1998.
[11] Richard Feiertag, Sue Rho, Lee Benzinger, Stephen Wu, Timothy Redmond,  Cui  Zhang,  Karl  Levitt,  Dave  Peticolas,  Mark  Heckman, Stuart  Staniford,  and  Joey  McAlerney.  “Intrusion  detection  inter-

component adaptive negotiation”,  Computer Networks 34 (2000) 605-
621.
[12]  Serge Fenet and Salima Hassas. “A distributed Intrusion Detection and Response  System  based  on  mobile  autonomous  agents  using  social insects communication paradigm”,  Published by Elsevier Science B. V.,
2001.
[13] G. B. White, E.A.Fisch, and U. W. Pooch. “Cooperating security managers:  A  peer-based  intrusion  detection  system”,    10(1):  20-23,
1996.
[14]  J.  Barrus and  N.  Rowe.    “A distributed  autonomous-agent  network- intrusion detection and response system”,   In proceeding of the 1998
Command and Control Research and Technology Symposium, 1998.
[15]  Sabeel Ansari, Rajeev S.G., and Chandrashekar H.S. “Packet Sniffing: A Brief Introduction”, IEEE, JANUARY 2003.
[16]  Snort website: www.snort.org (Accessed in January 15, 2003)
[17]  Martin Roesch. “Snort - Lightweight Intrusion Detection for Networks”.
A   white   paper   on   the   design   features   of   Snort   2.0   from:
www.sourcefire.com/technology/whitepapers.html (accessed in January
15, 2004).
[18]  Mohamed Mohsen and Khaled Heloue.“Mobile Agents System for Data Retrieval”, Final Year Project Report, American University of Beirut, August 2003.
[19]  The main website of Windump: www.tcpdump.org (Accessed in January
10, 2004).

Thursday, 15 March 2012

GATE 2012 RESULTS-RESULTS FOR GATE 2012

 GATE 2012 RESULTS

Wednesday, 14 March 2012

UPSC IES EXAMINATION 2012-MATERIALS FOR IES EXAM 2012-RECRUITMENT IN IES EXAM 2012


UPSC INDIAN ENGINEERING SERVICES ENTRANCE
UPSC IES EXAMINATION

        The Indian Engineering Services Examination, a reputed exam conducted by the Union Public Service Commission (UPSC), India every year for the recruitment to engineering services in government sector. Recruitment will be for four below mentioned categories of engineering which are:
1.)         Civil Engineering
2.)         Mechanical Engineering
3.)         Electrical Engineering
4.)         Electronics & telecommunication Engineering

Click here to
       View GUIDELINES
Download Guidelines for filling application.

IES EXAM PATTERN:
          The UPSC IES exam consists of 5 papers.
·         Paper 1 comprise of General Ability Test-objective questions,
·         Paper 2 & paper 3  comprise of objective questions (respective streams i.e., Civil, Mech, EEE, ECE/ET),
·         Paper 4 & Paper 5 contains conventional/theory paper (respective streams i.e., Civil, Mech, EEE, ECE/ET).

          Both sections contain all relevant syllabus which is taught in entire discipline of engineering (Civil Engineering, Mechanical Engineering, Electrical Engineering and Electronics & Telecommunication Engineering.)

Details of Paper 2:
          Personality test consist of  200 marks , its for those candidates who qualify the written exam.  Detailed IES entrance pattern is given here in.


UPSC IES'2012 DATES SCHEDULE:
Notifications: 10.03.2012
Last Date for submission of application form: 09.04.2012 (Monday)
Examination date:
15.06.2012 (Friday)             - General  (1)  - Objective
16.06.2012 (Saturday)         - Paper 1  (2)  - Objective
17.06.2012 (Sunday)           - Paper 2  (2)  - Theory/Conventinal

ENTRANCE FEE:
a.   Rs. 50/- for online applicants.
b.   Rs. 100/-for Candidates of Specified remote areas.
c.   No fee for Females/SCs/STs/Physically Handicapped only


DOWNLOAD 2011 QUESTION PAPER:
·         General Ability Test
·         Objective Papers
o   CIVIL
§  Paper I
§  Paper II
o   MECHANICAL
§  Paper I
§  Paper II
o   ELECTRICAL
§  Paper I
§  Paper II
o   ELECTRONICS & TELECOMMUNICATION
§  Paper I
§  Paper II

·         Conventional Papers
o   CIVIL
§  Paper I
o   MECHANICAL
§  Paper I
§  Paper II
o   ELECTRICAL
§  Paper I
§  Paper II
o   ELECTRONICS & TELECOMMUNICATION
§  Paper I
§  Paper II



DOWNLOAD 2010 QUESTION PAPERS
·         General Ability Test
·         Objective Papers
d.      E & T Engineering Paper I           E & T Engineering Paper II
·         Conventional Papers



UPSC IES Eligibility Qualification:
Age Criteria: Minimum age of the candidates must be 21 to 30 years on 1st August of the year of Examination. However, certain categories of persons including departmental candidates as specified in the Commission's Notice as published in the national news papers such as Employment News etc. are eligible for age relaxation.

Educational Eligibility Criteria:  
1.)         A degree in Engineering from a recognized university or equivalent. MSc degree or its equivalent with Wireless Communications, Electronics, Radio Physics or Radio Engineering as special subjects also acceptable for certain Services/posts only.
2.)         Candidates appearing at their engineering degree or equivalent examination are also eligible to compete. Candidates qualifying on the result of the written part of the Examination will be required to submit the proof of passing the requisite examination along with their detailed application form to be filled up at that stage.

DO’s
A      Before submitting the filled in application form, ensure
·         That you have purchased the Application Form from the Post Office only.
·         That you have correctly indicated the name and year of the examination for which you are applying.
·         That you have filled all the relevant columns correctly.
·         To change responses, if required, you have erased darkened circles completely.
·         That you have pasted your photograph firmly at the space provided.
·         That you have pasted firmly the CRF Stamp (if applicable). You should paste only one CRF Stamp of requisite denomination and get it cancelled from the Post Office of purchase.
·         That you have mentioned correctly the Commission's Notice No. and date as published in the Employment News/Rozgar Samachar.
·         That you have signed the Declaration and mentioned the date and place of mailing the Form.
·         That you are using the pre-addressed envelope supplied to mail the Application form and Acknowledgement Card. No other documents or copies of certificates or self-addressed envelopes are required to be sent along with the Application Form.
·         That you have read the relevant examination rules and instructions before filling up the form.
·         That you have noted down separately and kept for record and future reference the eight digit form number printed under the bar-code and entered the same correctly in the acknowledgement card.

B.   Also do ensure that you dispatched the form sufficiently in advance to ensure that it reaches the Commission office before the   
      prescribed closing date.

Don'ts
·         Do not use the photocopy of the Application Form.
·         Do not make any stray marks on the Form.
·         Do not staple, pin, mutilate, scribble, tear, or wet the Form.
·         Do not send enclosures (like certificates, etc.) with your form only acknowledgement card is necessary, if application is sent by post.

Search Here...