Skip to main content

An Intelligent Agent-Based Framework for Collaborative Information Security

  • Conference paper
AI 2005: Advances in Artificial Intelligence (AI 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3809))

Included in the following conference series:

  • 1757 Accesses

Abstract

In this paper we proposed a framework for collaborative intelligent agents in a distributed environment to execute sound security strategies to protect information resources. First, the intelligent agent based Duty Reliable Center in the framework uses group decision method to determine a global information threat level. Then local agent employs the threat level and applies the Bayes’ decision procedure to calculate expected loss of its all possible actions, and choices an action among them with minimum expected loss to protect its information resources. The model enables an agent to choose among alternatives in an optimal fashion, taking into account the worth of acquiring prior information to reduce the uncertainty. Because system operations are distributed, hackers are unlikely to wreck the whole system. Thus, it is expected to yield information security cost-effective solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hung, K.: Network System Intrusion and Protection. Unalis Publish (2000)

    Google Scholar 

  2. Denning, D.E.: An Intrusion-Detection Model. IEEE Transactions on Software Engineering SE-13(2), 222–232 (1987)

    Article  Google Scholar 

  3. Kumar, S.: Classification and Detection of Computer Intrusions, Purdue University Ph.D. Dissertation (1995)

    Google Scholar 

  4. Helmer, G.G., Honavar, J.S.K.V., Miller, L.: Intelligent Agents for Intrusion Detection. In: IEEE Information Technology Conference, September 1998, pp. 121–124 (1998)

    Google Scholar 

  5. Spafford, E.H., Zamboni, D.: Intrusion Detection Using Autonomous Agents. Computer Networks 34, 547–570 (2000)

    Article  Google Scholar 

  6. Boudaoud, K., Labiod, H., Boutaba, R., Guessoum, Z.: Network Security Management with Intelligent Agents. IEEE Security Management (I), 579–592 (2000)

    Google Scholar 

  7. Hegazy, I.M., Al-Arif, T., Fayed, Z.T., Faheem, H.M.: A multi-agent based system for intrusion detection. Potentials, IEEE 22(4), 28–31 (2003)

    Article  Google Scholar 

  8. Helmer, G., Wong, J.S.K., Honavar, V., Miller, L., Wang, Y.: Lightweight agents for intrusion detection. Journal of Systems and Software 67(2), 109–122 (2003)

    Article  Google Scholar 

  9. Lang, B., Liu, J., Zheng, J.: The research on automated intrusion response system based on mobile agents. In: The 8th International Conference on Computer Supported Cooperative Work in Design, vol. 1, pp. 344–347 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kuo, M.H. (2005). An Intelligent Agent-Based Framework for Collaborative Information Security. In: Zhang, S., Jarvis, R. (eds) AI 2005: Advances in Artificial Intelligence. AI 2005. Lecture Notes in Computer Science(), vol 3809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11589990_66

Download citation

  • DOI: https://doi.org/10.1007/11589990_66

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30462-3

  • Online ISBN: 978-3-540-31652-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics