NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Effective intrusion detection capability is an elusive goal, not solved easily or with a single mechanism. However, mobile software agents go a long way toward realizing the ideal behavior desired in an Intrusion Detection System (IDS). This paper is an initial look at the relatively unexplored terrain of using mobile agents for intrusion detection and response. It looks not only at the benefits derived from mobility, but also those associated with software agent technology. We explore these benefits in some detail and propose a number of innovative ways to apply agent mobility to address the shortcomings of current IDS designs and implementations. We also look at new approaches for automating response to an intrusion, once detected.
Proceedings Title
Canadian Information Technology Security, Symposium | | Computer Communications | IPC Science and Technology Press
intrusion detection, intrusion response, mobile agents
Citation
Jansen, W.
(2002),
Intrusion Detection with Mobile Agents, Canadian Information Technology Security, Symposium | | Computer Communications | IPC Science and Technology Press, Ottawa, CA, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=151209
(Accessed October 18, 2025)