Distributed network multi agent security system. Net-Mass

Authors

  • Daniel Horfan Álvarez Universidad de San Buenaventura
  • Andrew Mark Bailey Universidad de San Buenaventura
  • Lucas Adrián Gómez Blandón Universidad de San Buenaventura

DOI:

https://doi.org/10.17533/udea.redin.343174

Keywords:

information security, multiagent systems, JAVA, JINI

Abstract

Network security is one of the weakest and most sensitive areas within an organization, because it requires different strategies to protect vulnerable points as well as the coordination and distribution of efforts in order to encompass all the possible forms and points of computer attacks. In this article a distributed multiagent system is proposed as a tool to protect security in networks with different operating systems and which consequently are susceptible to diverse attacks. The system proposed is composed of heterogeneous autonomous agents with different characteristics in terms of their strategies of intruder detection and protection of primary network systems. It is planned that these agents will base their decisions on the application of different artificial intelligence techniques, such as expert system heuristics, evolutionary algorithms, and neural networks.

|Abstract
= 102 veces | PDF (ESPAÑOL (ESPAÑA))
= 57 veces|

Downloads

Download data is not yet available.

Author Biography

Lucas Adrián Gómez Blandón, Universidad de San Buenaventura

Estudiante de Ingeniería de Sistemas

References

http://www.sans.org. Consultado el 31 de marzo de 2004.

http://isc.sans.org/country report.html. Consultado el 18 de febrero de 2004.

http://www.cert.org. Consultado el 31 de marzo de 2004.

http://www.cert.org/archive/pdf/99tr028.pdf. Consultado el 31 de marzo de 2004.

D. Horfan et al. “Método para manejar el problema de la recarga de trabajo en los sistemas multiagentes”. Memorias Tecnocom 2003.

B. Hayes-Roth. “An Architecture for Adaptive Intelligent System”. Artificial intellignece: special issue on agents and interactivity. Vol. 72. N.o 1-2. Enero de 1995. pp. 72, 329-365. (Disponible electrónicamente en: https://portal.acm.org/poplogin.cfm?dl=ACM&coll=portal&comp_id=COMPONENT030&want_href=citation%2Ecfm%3Fid%3D201271&CFID=24619593&CFTOK EN=21127073. Consultado el 28 de marzo de 2004). DOI: https://doi.org/10.1016/0004-3702(94)00004-K

S. C. Smith et al. KidSim: programming agents without a programming language. Communications of the ACM. Julio de 1994. pp. 37, 55-67. (Disponible electrónicamente en: http://www.acypher.com/Publications/CACM/KidSimCACM.html. Consultado el 28 de marzo de 2004). DOI: https://doi.org/10.1145/176789.176795

P. Maes. Artificial life meets entertainment: lifelike autonomous agents. Communications of the ACM. 1995. pp. 38, 108-114. (Disponible electrónicamente en: http://portal.acm.org/ft_gateway.cfm?id=219808&type=pdf&dl=portal&dl=ACM&CFID=11111111&CFTOKEN=2222222. Consultado el 28 de marzo de 2004). DOI: https://doi.org/10.1145/219717.219808

N. Hyacinth. “Software agents: and overview”. Knowledge Engineering Review. Vol. 11. N.o 3. Cambridge University Press. September 1996. pp. 1-40. (Disponible electrónicamente en: http://agents.umbc.edu/introduction/ao/. Consultado el 31 de marzo de 2004). DOI: https://doi.org/10.1017/S026988890000789X

T. Finin et al. KQML as an agent communication language. Reporte técnico. Departamento de Ciencias Computacionales. Universidad de Mayfield Baltimore Country. Baltimore, MD. 1997. (Disponible electrónicamente en http://www.cs.umbc.edu/agents/introduction/kqmlacl.ps. Consultado el 27 de marzo de 2004).

P. Mell et al. An overview of issues in testing intrusion detection systems. National Institute of Standards and Technology ITL. 2002. DOI: https://doi.org/10.6028/NIST.IR.7007

http://csrc.nist.gov/publications/nistir/nistir-7007.pdf. Consultado el 28 de marzo de 2004.

http://JAVA.sun.com/j2se/1.4.2/docs/guide/rmi-iiop/index.html. Consultado el 28 de marzo de 2004.

http://JAVA.sun.com/products/jms. Consultado el 28 de marzo de 2004.

W. K. Edwards. Core JINI. 2.a ed. Prentice-Hall. 2000.

http://JAVA.sun.com/products/JINI/. Consultado el 31 de marzo de 2004.

http://www.JINI.org. Consultado el 31 de marzo de 2004. 18. http://JAVA.sun.com/products/JAVAManagement/. Consultado el 31 de marzo de 2004.

Published

2005-07-24

How to Cite

Horfan Álvarez, D. ., Mark Bailey, A. ., & Gómez Blandón, L. A. . (2005). Distributed network multi agent security system. Net-Mass. Revista Facultad De Ingeniería Universidad De Antioquia, (34), 101–113. https://doi.org/10.17533/udea.redin.343174