QUERY: Jurnal Sistem Informasi Volume: 01, Number: 02, October 2017 ISSN 2579-5341 (online) ~1~ The Development of Agent Information for Intrusion Detection Bambang Sugiantoro Dept. of Informatics, State Islamic University Sunan Kalijaga, Yogyakarta. bambang.sugiantoro@uin-suka.ac.id Abstract As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has been gradually developed. Agent-based approach for intrusion detection system has developed from single to multi agent, and later developed mobile agents in order to increase system's capability to face with a more complex challenge and change. A number of studies had been identified that mobile agent can reduce network traffic, however the study related to intrusion detection using static and mobile agent for finding intruder has not been fully achieved. Keywords: Information, Intrusion, mobile, networks 1. INTRODUCTION Along with the development of the Internet network, crimes committed in cyberspace experiencing growth. According to data from the annual report 2013 panda lab reported infiltration associated with illegal acts to login in social networks, especially Twitter by 250,000 [1]. Non-material and material loss is the impact that causes the illegal acts committed by an intruder. Research in the field of security to detect intruders becomes important to get attention, because of losses caused by the intrusion. Infiltration / intrusion defined activities that seek to damage or misuse the system or any business that do compromise the integrity, trustworthiness or availability of a computer's resources. This definition does not depend on the success or failure of the action, so it relates to an attack on a computer system [2]. Mobile Agent provides a solution to be implemented in the network because it uses relatively little bandwidth compared to conventional client-server concept, the mobile agent traveled to resources so as to reduce network traffic. Another advantage of the mobile agent is its ability to survive and operate even though its owner had dropped out of the network. This makes the concept of mobile agent is superior to the conventional model of client server Approaches mobile agent system for intrusion detection in multi host, has the advantage to improve performance IDS is, when the mobile agent is applied has several drawbacks, among is the issue of security vulnerabilities of mobile agent of the problems and code size mobile agent IDS, potential threats can be categorized into four , the agent of the mobile agent, agent to the visited mobile agent platform, the platform of the mobile agent and entities external to the platform [3]. In the proposed research to improve the intruder issues including external entities that take advantage of the departure of the mobile agent to conduct infiltration. 2. DESCRIPTION OF INTRUSION DETECTION ARCHITECTURE General architectural of mobile agent to IDS with the cooperation mechanism between multi agent and to take advantage of misuse detection IDS analysis with string matching technique. The set of hosts to be detected is {h1, h2, h3, ..., hk}, with D data set obtained is {d1, d2, d3, ..., dk}. Mobile agent