Abstract
Due to the complexity of the problem of the network security diagnosis it is necessary to apply effective mechanisms allowing coping with not only knowledge enormity, but also incompleteness and inconsistency. In this connection a proper solution is to apply the multi-agent approach in the network security systems. In this paper the multi-agent system for computer network security monitoring is presented. The overall architecture including agents’ knowledge representation, knowledge management and behavior specification is proposed.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Balasubramaniyan, J.S., Garcia-Fernandez, J.O., Isacoff, D., Spafford, E., Zamboni, D.: An Architecture for Intrusion Detection Using Autonomous Agents. In: Proceedings of the 14th Annual Computer Security Applications Conference (1998)
Biermann, E., Cloete, E., Venter, L.M.: A comparison of Intrusion Detection systems. Computers and Security 20(8), 676–683 (2001)
Bejtlich, R.: Tao of Network Security Monitoring, The: Beyond Intrusion Detection. Addison-Wesley, Reading (2004)
Dasgupta, D.: Immunity-Based Intrusion Detection System: A General Framework. In: Proceedings of the 22nd National Information Systems Security Conference, USA (1999)
Denning, D.E., Edwards, D.L., Jagannathan, R., Lunt, T.F., Neumann, P.G.: A prototype IDES: A real-time intrusiondetection expert system. Technical report, Computer Science Laboratory, SRI International, Menlo Park (1987)
Kolaczek, G., Pieczynska, A., Juszczyszyn, K., Grzech, A., Katarzyniak, R., Nguyen, N.T.: A mobile agent approach to intrusion detection in network systems, Lecture Notes in Computer Science, Lecture Notes in Artificial Intelligence. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3682, pp. 514–519. Springer, Heidelberg (2005)
Mirkovic, J., Dietrich, S., Dittrich, D., Reiher, P.: Internet Denial of Service: Attack and De fense Mechanisms. Prentice-Hall, Englewood Cliffs (2005)
Nguyen, N.T., Juszczyszyn, K., Kolaczek, G., Grzech, A., Pieczynska, A., Katarzyniak, R.: Agent-based approach for distributed intrusion detection system design. In: Alexandrov, V.N., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2006. LNCS, vol. 3993, pp. 224–231. Springer, Heidelberg (2006)
FIPA Specifications: http://www.fipa.org/
Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks 51(12), 3448–3470 (2007)
Spafford, E., Zamboni, D.: Intrusion detection using autonomous agents, Computer Networks. The International Journal of Computer and Telecommunications Networking 34(4), 547–570 (2000)
Wilson, E.: Network Monitoring and Analysis: A Protocol Approach to Troubleshooting. Prentice-Hall, Englewood Cliffs (1999)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Prusiewicz, A. (2008). A Multi-agent System for Computer Network Security Monitoring. In: Nguyen, N.T., Jo, G.S., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2008. Lecture Notes in Computer Science(), vol 4953. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78582-8_85
Download citation
DOI: https://doi.org/10.1007/978-3-540-78582-8_85
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78581-1
Online ISBN: 978-3-540-78582-8
eBook Packages: Computer ScienceComputer Science (R0)