Abstract
We have developed a mobile-agent based network monitoring system. In this system, multiple agents coordinate with each other to collectively perform network monitoring. This paper deals with the coordination of multiple agents to achieve monitoring functions and failed component recovery. We also address the security needs of our monitoring system, i.e. types of attacks that could be launched on the system, and our solutions to thwart them. Finally, we present our experiences with the system and the resource overhead imposed by it.
This work was supported by National Science Foundation grants ANI 0087514 and EIA 9818338.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Jansen, W., Mell, P., Karygiannis, T., Marks, D.: Applying Mobile Agents to Intrusion Detection and Response. National Institute of Standards and Technology Interim Report-6416 (1999)
Fuggetta, A., Picco, G.P., Vigna, G.: Understanding Code Mobility. IEEE Transactions on Software Engineering 24 (1998) 342–361
Harrison, C.G., Chess, D.M., Kershenbaum, A.: Mobile Agents: Are they a good idea? Technical report, IBM Research Division, T.J.Watson Research Center (1995) Available at URL http://www.research.ibm.com/massdist/mobag.ps.
White, G.B., Fisch, E., Pooch, U.: Cooperating Security Managers: A Peer-Based Intrusion Detection System. IEEE Network 10 (1996) 20–23
Stallings, W.: SNMP and SNMPv2: the infrastructure for network management. IEEE Communications Magazine 36 (1998) 37–43
Tripathi, A., Karnik, N., Vora, M., Ahmed, T., Singh, R.: Mobile Agent Programming in Ajanta. In: Proceedings of the 19th International Conference on Distributed Computing Systems. (1999) 190–197
Tripathi, A., Ahmed, T., Pathak, S., Carney, M., Dokas, P.: Paradigms for Mobile Agent-Based Active Monitoring. In: IEEE Network Operations and Management Symposium. (2002) 65–78
Roesch, M.: Snort-Lightweight Intrusion Detection for Networks. In: 13th Systems Administration Conference-LISA. (1999)
Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., Stoner, E.: State of the practice of intrusion detection technologies. Technical Report CMU/SEI-99-TR-028, Software Engineering Institute, Carnegie Mellon University (2000) Available at URL http://www.sei.cmu.edu/.
Karnik, N., Tripathi, A.: Security in the Ajanta Mobile Agent System. Software Practice and Experience31 (2001) 301–329
Balasubramaniyan, J., Garcia-Fernandez, J.O., Isaco., D., Spafford, E., Zamboni, D.: An Architecture for Intrusion Detection using Autonomous Agents. Technical Report Coast TR 98-05, Department of Computer Sciences, Purdue University (1998)
Bellavista, P., Corradi, A., Stefanelli, C.: An Open Secure Mobile Agent Framework for Systems Management. Journal of Network and Systems Management (JNSM) 7 (1999) 323–339
Pinheiro, R., Poylisher, A., Caldwell, H.: Mobile Agents for Aggregation of Network Mangagement Data. In: 1st International Symposium on Agent Systems and Applications, and 3rd International Symposium on Mobile Agents. (1999) 130–140
Porras, P.A., Neumann, P.G.: EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In: Proceedings of the 20th National Information Systems Security Conference. (1997) 353–365
Vigna, G., Kemmerer, R.: NetSTAT: A Network-based Intrusion Detection System. Journal of Computer Security 7 (1999) 37–71
Vigna, G., Kemmerer, R., Blix, P.: Designing a Web of Highly-Configurable Intrusion Detection Sensors. In Lee, W., Mé, L., Wespi, A., eds.: Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001). Volume 2212 of LNCS., Davis, CA, Springer-Verlag (2001) 69–84
Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer Networks (Amsterdam, Netherlands: 1999) 31 (1999) 2435–2463
Karjoth, G., Lange, D., Oshima, M.: A Security Model for Aglets. IEEE Internet Computing(1997) 68–77
Picco, G., Murphy, A., Roman, G.: LIME: Linda meets mobility. In: Proceedings of the 1999 International Conference on Software Engineering. (1999) 368–377
Cao, J., Feng, X., Lu, J., Das., S.K.: Research feature-Mailbox-based scheme for mobile agent communications. IEEE Computer 35 (2002) 54–60
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tripathi, A.R., Koka, M., Karanth, S., Pathak, A., Ahmed, T. (2003). Secure Multi-agent Coordination in a Network Monitoring System. In: Garcia, A., Lucena, C., Zambonelli, F., Omicini, A., Castro, J. (eds) Software Engineering for Large-Scale Multi-Agent Systems. SELMAS 2002. Lecture Notes in Computer Science, vol 2603. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-35828-5_16
Download citation
DOI: https://doi.org/10.1007/3-540-35828-5_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-08772-4
Online ISBN: 978-3-540-35828-2
eBook Packages: Springer Book Archive