Summary: Using Mobile Agents for Analyzing Intrusion in Computer Networks
Jay Aslam Marco Cremonini David Kotz Daniela Rus
Department of Computer Science, Institute for Security Technology Studies
Hanover, NH 03755
Today hackers disguise their attacks by launching
them form a set of compromised hosts distributed
across the Internet. It is very difficult to defend
against these attacks or to track down their origin.
Commercially available intrusion detection systems
can signal the occurrence of limited known types of at-
tacks. New types of attacks are launched regularly but
these tools are not effective in detecting them. Human
experts are still the key tool for identifying, tracking,
and disabling new attacks. Often this involves experts
from many organizations working together to share
their observations, hypothesis, and attack signatures.
Unfortunately, today these experts have few tools that
help them to automate this process.
In this project we recognize that human experts