Skip to main content

Ontology-Based Multi-agent Model of an Information Security System

  • Conference paper
New Directions in Rough Sets, Data Mining, and Granular-Soft Computing (RSFDGrC 1999)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 1711))

Abstract

The paper is focused on a distributed agent-based information security system of a computer network. A multi-agent model of an information security system is proposed. It is based on the established ontology of the information security system domain. Ontology is used as a means of structuring distributed knowledge, utilized by the information security system, as the common ground of interacting agents as well as for the agent behavior coordination.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Balasubramaniyan, J., Garcia-Fernandez, J., Isakoff, D., Spafford, E., Zamboni, D.: An Architecture for Intrusion Detection using Autonomous Agents. In: Proceedings of the 14th Annual Computer Security Applications Conference. Phoenix, Arizona, December 7-11 (1998)

    Google Scholar 

  2. Forrest, S., Hofmeyer, S.A., Somayaji, A.: Computer Immunology. Communication of the ACM 40(10), 88–96 (1997)

    Article  Google Scholar 

  3. Gruber, T.R.: Toward principles for the design of ontologies used for knowledge sharing. In: Proceedings of International Workshop on Formal Ontology (March 1993)

    Google Scholar 

  4. Hochberg, et al.: “NADIR”: An Automated System for Detecting Network Intrusion and Misuse. Computers and Security 12(3), 235–248 (1993)

    Article  Google Scholar 

  5. Lunt, T., et al.: Knowledge-based Intrusion Detection. In: Proceedings of 1989 Governmental Conference Artificial Intelligence Systems (March 1989)

    Google Scholar 

  6. Porras, P.A., Neumann, P.G.: EMERALD: Event monitoring enabling responses to autonomous live disturbance. In: Proceedings of 20-th National Information System Security Conference. National Institute of Standards and Technologies (1997)

    Google Scholar 

  7. Stainford-Chen, S., et al.: GrIDS: A Graph-based Intrusion Detection System for Large Networks. In: Proceedings of the 19th National Information System Security Conference, October 1996, vol. 1, pp. 361–370. National Institute of Standards and Technology (1996)

    Google Scholar 

  8. Stolfo, S.J., Prodromidis, A.L., Tselepis, S., Lee, W., Fan, D.W., Chan, P.K.: Jam: Java agents for meta-learning over distributed databases. In: Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining, Newport Beach, CA, pp. 74–81 (1997)

    Google Scholar 

  9. White, G., Fish, E., Pooch, U.: Cooperating Security Managers: A Peer-Based Intrusion Detection System. IEEE Network, 20–23 (January/February 1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gorodetski, V.I., Popyack, L.J., Kotenko, I.V., Skormin, V.A. (1999). Ontology-Based Multi-agent Model of an Information Security System. In: Zhong, N., Skowron, A., Ohsuga, S. (eds) New Directions in Rough Sets, Data Mining, and Granular-Soft Computing. RSFDGrC 1999. Lecture Notes in Computer Science(), vol 1711. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-48061-7_65

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-48061-7_65

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66645-5

  • Online ISBN: 978-3-540-48061-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics