Advertisement

Secure Multi-agent Coordination in a Network Monitoring System

  • Anand R. Tripathi
  • Muralidhar Koka
  • Sandeep Karanth
  • Abhijit Pathak
  • Tanvir Ahmed
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2603)

Abstract

We have developed a mobile-agent based network monitoring system. In this system, multiple agents coordinate with each other to collectively perform network monitoring. This paper deals with the coordination of multiple agents to achieve monitoring functions and failed component recovery. We also address the security needs of our monitoring system, i.e. types of attacks that could be launched on the system, and our solutions to thwart them. Finally, we present our experiences with the system and the resource overhead imposed by it.

Keywords

Mobile agents Network monitoring Monitoring system security Multi-agent systems Cooperating agents Mobile code 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Jansen, W., Mell, P., Karygiannis, T., Marks, D.: Applying Mobile Agents to Intrusion Detection and Response. National Institute of Standards and Technology Interim Report-6416 (1999)Google Scholar
  2. 2.
    Fuggetta, A., Picco, G.P., Vigna, G.: Understanding Code Mobility. IEEE Transactions on Software Engineering 24 (1998) 342–361CrossRefGoogle Scholar
  3. 3.
    Harrison, C.G., Chess, D.M., Kershenbaum, A.: Mobile Agents: Are they a good idea? Technical report, IBM Research Division, T.J.Watson Research Center (1995) Available at URL http://www.research.ibm.com/massdist/mobag.ps.
  4. 4.
    White, G.B., Fisch, E., Pooch, U.: Cooperating Security Managers: A Peer-Based Intrusion Detection System. IEEE Network 10 (1996) 20–23CrossRefGoogle Scholar
  5. 5.
    Stallings, W.: SNMP and SNMPv2: the infrastructure for network management. IEEE Communications Magazine 36 (1998) 37–43CrossRefGoogle Scholar
  6. 6.
    Tripathi, A., Karnik, N., Vora, M., Ahmed, T., Singh, R.: Mobile Agent Programming in Ajanta. In: Proceedings of the 19th International Conference on Distributed Computing Systems. (1999) 190–197Google Scholar
  7. 7.
    Tripathi, A., Ahmed, T., Pathak, S., Carney, M., Dokas, P.: Paradigms for Mobile Agent-Based Active Monitoring. In: IEEE Network Operations and Management Symposium. (2002) 65–78Google Scholar
  8. 8.
    Roesch, M.: Snort-Lightweight Intrusion Detection for Networks. In: 13th Systems Administration Conference-LISA. (1999)Google Scholar
  9. 9.
    Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., Stoner, E.: State of the practice of intrusion detection technologies. Technical Report CMU/SEI-99-TR-028, Software Engineering Institute, Carnegie Mellon University (2000) Available at URL http://www.sei.cmu.edu/.
  10. 10.
    Karnik, N., Tripathi, A.: Security in the Ajanta Mobile Agent System. Software Practice and Experience31 (2001) 301–329zbMATHCrossRefGoogle Scholar
  11. 11.
    Balasubramaniyan, J., Garcia-Fernandez, J.O., Isaco., D., Spafford, E., Zamboni, D.: An Architecture for Intrusion Detection using Autonomous Agents. Technical Report Coast TR 98-05, Department of Computer Sciences, Purdue University (1998)Google Scholar
  12. 12.
    Bellavista, P., Corradi, A., Stefanelli, C.: An Open Secure Mobile Agent Framework for Systems Management. Journal of Network and Systems Management (JNSM) 7 (1999) 323–339zbMATHCrossRefGoogle Scholar
  13. 13.
    Pinheiro, R., Poylisher, A., Caldwell, H.: Mobile Agents for Aggregation of Network Mangagement Data. In: 1st International Symposium on Agent Systems and Applications, and 3rd International Symposium on Mobile Agents. (1999) 130–140Google Scholar
  14. 14.
    Porras, P.A., Neumann, P.G.: EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In: Proceedings of the 20th National Information Systems Security Conference. (1997) 353–365Google Scholar
  15. 15.
    Vigna, G., Kemmerer, R.: NetSTAT: A Network-based Intrusion Detection System. Journal of Computer Security 7 (1999) 37–71Google Scholar
  16. 16.
    Vigna, G., Kemmerer, R., Blix, P.: Designing a Web of Highly-Configurable Intrusion Detection Sensors. In Lee, W., Mé, L., Wespi, A., eds.: Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001). Volume 2212 of LNCS., Davis, CA, Springer-Verlag (2001) 69–84CrossRefGoogle Scholar
  17. 17.
    Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer Networks (Amsterdam, Netherlands: 1999) 31 (1999) 2435–2463Google Scholar
  18. 18.
    Karjoth, G., Lange, D., Oshima, M.: A Security Model for Aglets. IEEE Internet Computing(1997) 68–77Google Scholar
  19. 19.
    Picco, G., Murphy, A., Roman, G.: LIME: Linda meets mobility. In: Proceedings of the 1999 International Conference on Software Engineering. (1999) 368–377Google Scholar
  20. 20.
    Cao, J., Feng, X., Lu, J., Das., S.K.: Research feature-Mailbox-based scheme for mobile agent communications. IEEE Computer 35 (2002) 54–60Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Anand R. Tripathi
    • 1
  • Muralidhar Koka
    • 1
  • Sandeep Karanth
    • 1
  • Abhijit Pathak
    • 1
  • Tanvir Ahmed
    • 1
  1. 1.Department of Computer ScienceUniversity of MinnesotaMinneapolisUSA

Personalised recommendations