Skip to main content

Approach to Solving Security Problems Using Meta-Agents in Multi Agent System

  • Conference paper
Book cover Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2008)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4953))

Abstract

In this paper, we present an approach of integrating meta-agents in Web Services. Web Services requires an appropriate level of security to support business systems to be used by anyone, anywhere, at anytime and any platform. However, the increased use of distributed systems with message passing produces a growing set of security problems. This especially concerns threats and attacks on Web Services consisting of transactions with valuable resources. To prevent possible attacks on Web Services, we propose using meta-agents over software agents in a multi-agent system. The multi-agent system consists of a network of software agents that secure the message passing at the transport and application levels. To avoid attacks on these agents, we use meta-agents to monitor the software agents’ actions and then to direct the software agents’ work. These meta-agents are also used to handle unexpected events in the actions of the software agents.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fasli, M.: On agent technology for e-commerce: trust, security and legal issues. The Knowledge Engineering Review 22(1), 3–35 (2007)

    Article  Google Scholar 

  2. Gorodetski, V., Kotenko, I.: The multi-agent systems for computer network security assurance: frameworks and case studies. In (ICAIS 2002). IEEE International Conference on Artificial Intelligence Systems, pp. 297–302 (2002), ISBN: 0-7695-1733-1

    Google Scholar 

  3. Håkansson, A., Hartung, R.: Using Meta-Agents for Multi-Agents in Networks. In: Arabnia, H., et al. (eds.) Proceedings of The 2007 International Conference on Artificial Intelligence, ICAI 2007, vol. II, pp. 561–567. CSREA Press, U.S.A (2007a), www.world-academy-of-science.org

    Google Scholar 

  4. Håkansson, A., Hartung, R.: Calculating optimal decision using Meta-level agents for Multi-Agents in Networks. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part I. LNCS (LNAI), vol. 4692, pp. 180–188. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Moradian, E., Håkansson, A.: Possible attacks on XML Web Services (IJCSNS) International Journal of Computer Science and Network Security 6(1B) (2006), Journal ISSN: 1738-7906

    Google Scholar 

  6. Pedireddy, T., Vidal, J.M.: A Prototype MultiAgent Network Security System. In: AAMAS 2003 Proceedings of the second international joint conference on Autonomous agents and multiagent systems, Melbourne, Australia, July 14 - 18 (2003)

    Google Scholar 

  7. W3C XML Protocol Working Group, http://www.w3.org/TR/

  8. Nielsen, H.F., Thatte, S.: Web Services Routing Protocol (WS-Routing), http://msdn2.microsoft.com/en-us/library/ms951249.aspx

  9. Adsett, C., Bernardi, A., Liu, S., Spencer, B.: Realising Weak Work Workflow with Declarative Flexible XML Routing in SOAP (DeFleX) (2004)

    Google Scholar 

  10. Chelberg, D., Welch, L., Lakshmikumar, A., Gillen, M.: Meta-Reasoning For a Distributed Agent Architecture. In: Proceedings of the South-Eastern Symposium on System Theory, Athens, Ohio, USA, March 18-20, 2001, pp. 377–381 (2001)

    Google Scholar 

  11. Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach. Prentice-Hall, Inc., Englewood Cliffs (1995)

    MATH  Google Scholar 

  12. Wooldridge, M.J.: Introduction To Multi-Agent Systems. John Wiley and Sons Ltd., Chichester (2002)

    Book  Google Scholar 

  13. O’Neil, M.: Web Services Security. McGraw-Hill/Osborne, New York (2003)

    Google Scholar 

  14. Hartman, B., Flinn, D.J., Beznosov, K., Kawamoto, S.: Mastering Web Services Security. Wiley, Chichester (2003)

    Google Scholar 

  15. Peterson, G.: Security Concepts, Challenges, and Design Considerations for Web Services Integration, Cigital, Inc.; Howard Lipson, Software Engineering Institute (2006), https://buildsecurityin.us-cert.gov/daisy/bsi/articles/best-practices/assembly/639.html

  16. Demchenko, Y.: Attacks on Web Services and Grids. White paper (2004)

    Google Scholar 

  17. Papazoglou, M.: Web Services: Principles and Technology. Pearson Education, Essex England (2008)

    Google Scholar 

  18. Rosenberg, J., Remy, D.: Securing Web Services with WS-security (2004), ISBN 0-672-32651-5

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ngoc Thanh Nguyen Geun Sik Jo Robert J. Howlett Lakhmi C. Jain

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Moradian, E., Håkansson, A. (2008). Approach to Solving Security Problems Using Meta-Agents in Multi Agent System. In: Nguyen, N.T., Jo, G.S., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2008. Lecture Notes in Computer Science(), vol 4953. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78582-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-78582-8_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-78581-1

  • Online ISBN: 978-3-540-78582-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics