Abstract
The paper is focused on a distributed agent-based information security system of a computer network. A multi-agent model of an information security system is proposed. It is based on the established ontology of the information security system domain. Ontology is used as a means of structuring distributed knowledge, utilized by the information security system, as the common ground of interacting agents as well as for the agent behavior coordination.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Balasubramaniyan, J., Garcia-Fernandez, J., Isakoff, D., Spafford, E., Zamboni, D.: An Architecture for Intrusion Detection using Autonomous Agents. In: Proceedings of the 14th Annual Computer Security Applications Conference. Phoenix, Arizona, December 7-11 (1998)
Forrest, S., Hofmeyer, S.A., Somayaji, A.: Computer Immunology. Communication of the ACM 40(10), 88–96 (1997)
Gruber, T.R.: Toward principles for the design of ontologies used for knowledge sharing. In: Proceedings of International Workshop on Formal Ontology (March 1993)
Hochberg, et al.: “NADIR”: An Automated System for Detecting Network Intrusion and Misuse. Computers and Security 12(3), 235–248 (1993)
Lunt, T., et al.: Knowledge-based Intrusion Detection. In: Proceedings of 1989 Governmental Conference Artificial Intelligence Systems (March 1989)
Porras, P.A., Neumann, P.G.: EMERALD: Event monitoring enabling responses to autonomous live disturbance. In: Proceedings of 20-th National Information System Security Conference. National Institute of Standards and Technologies (1997)
Stainford-Chen, S., et al.: GrIDS: A Graph-based Intrusion Detection System for Large Networks. In: Proceedings of the 19th National Information System Security Conference, October 1996, vol. 1, pp. 361–370. National Institute of Standards and Technology (1996)
Stolfo, S.J., Prodromidis, A.L., Tselepis, S., Lee, W., Fan, D.W., Chan, P.K.: Jam: Java agents for meta-learning over distributed databases. In: Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining, Newport Beach, CA, pp. 74–81 (1997)
White, G., Fish, E., Pooch, U.: Cooperating Security Managers: A Peer-Based Intrusion Detection System. IEEE Network, 20–23 (January/February 1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gorodetski, V.I., Popyack, L.J., Kotenko, I.V., Skormin, V.A. (1999). Ontology-Based Multi-agent Model of an Information Security System. In: Zhong, N., Skowron, A., Ohsuga, S. (eds) New Directions in Rough Sets, Data Mining, and Granular-Soft Computing. RSFDGrC 1999. Lecture Notes in Computer Science(), vol 1711. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-48061-7_65
Download citation
DOI: https://doi.org/10.1007/978-3-540-48061-7_65
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66645-5
Online ISBN: 978-3-540-48061-7
eBook Packages: Springer Book Archive