Autonomous Malicious Activity Inspector – AMAI

  • Umar Manzoor
  • Samia Nefti
  • Yacine Rezgui
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6177)

Abstract

Computer networks today are far more complex and managing such networks is not more then a job of an expert. Monitoring systems helps network administrator in monitoring and protecting the network by not allowing the users to run illegal application or changing the configuration of the network node. In this paper, we have proposed Autonomous Malicious Activity Inspector – AMAI which uses ontology based knowledge base to predict unknown illegal applications based on known illegal application behaviors. AMAI is an Intelligent Multi Agent System used to detect known and unknown malicious activities carried out by the users over the network. We have compared ABSAMN and AMAI concurrently at the university campus having seven labs equipped with 20 to 300 number of PCs in various labs; results shows AMAI outperform ABSAMN in every aspect.

Keywords

Network Monitoring Malicious Activity Ontology Cognitive Mobile Agent Distributed Proxy Server Collaborative Multi-Agent System 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Manzoor, U., Nefti, S.: An agent based system for activity monitoring on network – ABSAMN. Expert Systems with Applications 36(8), 10987–10994 (2009)CrossRefGoogle Scholar
  2. 2.
    Ilarri, S., Mena, E., Illarramendi, A.: Using cooperative mobile agents to monitor distributed and dynamic environments. Information Sciences 178, 2105–2127 (2008)CrossRefGoogle Scholar
  3. 3.
    Shah, N., Iqbal, R., James, A., Iqbal, K.: Exception representation and management in open multi-agent systems. Information Sciences 179(15), 2555–2561 (2009)CrossRefGoogle Scholar
  4. 4.
    Lee, C., Jiang, C., Hsieh, T.: A genetic fuzzy agent using ontology model for meeting scheduling system. Information Sciences 176(9), 1131–1155 (2006)MATHCrossRefGoogle Scholar
  5. 5.
    Storey, V.C., Burton-Jones, A., Sugumaran, V., Purao, S.: A methodology for context-aware query processing on the World Wide Web. Information Systems Research 19(1), 3–25 (2008)CrossRefGoogle Scholar
  6. 6.
    Huhns, M.N., Stephens, L.M.: Personal ontologies. IEEE Internet Computing 3(5), 85–87 (1999)CrossRefGoogle Scholar
  7. 7.
    Weiss, G.: Multiagent Systems A Modern Approach to Distributed Artificial Intelligence, ch. 1-4. The MIT Press, Cambridge (1999)Google Scholar
  8. 8.
    Manzoor, U., Nefti, S.: Cognitive Agent for Automated Software Installation – CAASI. In: Lytras, M.D., Damiani, E., Carroll, J.M., Tennyson, R.D., Avison, D., Naeve, A., Dale, A., Lefrere, P., Tan, F., Sipior, J., Vossen, G. (eds.) WSKS 2009. LNCS, vol. 5736, pp. 543–552. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  9. 9.
    Paessler - PRTG Network Monitor (2009), http://www.paessler.com/prtg/
  10. 10.
    Network Monitoring Tools (2009), http://www.topology.org/comms/netmon.html
  11. 11.
    Nagios (2009), http://www.nagios.org/
  12. 12.
    YouHide (2009), http://www.youhide.com/
  13. 13.
    Java Agent Development Framework – JADE (2009), http://jade.tilab.com/
  14. 14.
    Protégé (2009), http://protege.stanford.edu/
  15. 15.
    Çankaya, S., Odabaşıa, H.F.: Parental controls on children’s computer and Internet use. Procedia - Social and Behavioral Sciences 1(1), 1105–1109 (2009)CrossRefGoogle Scholar
  16. 16.
    Nefti, S., Oussalah, M., Rezgui, Y.: A modified fuzzy clustering for documents retrieval: application to document categorization. Journal of the Operational Research Society 60(3), 384–394 (2009)MATHCrossRefGoogle Scholar
  17. 17.
  18. 18.
    Anonymous Proxy Server - Browser9 (2009), http://www.browser9.com/
  19. 19.
    Manzoor, U., Nefti, S.: QUIET: A Methodology for Autonomous Software Deployment using Mobile Agents. Journal of Network and Computer Applications (2010), http://dx.doi.org/10.1016/j.jnca.2010.03.015
  20. 20.
    Chen, S.-H.: Computationally intelligent agents in economics and finance. Information Sciences 177(5), 1153–1168 (2007)CrossRefGoogle Scholar
  21. 21.
    Rajiv, K., Hong, Z., Ramesh, R.: Enterprise integration using the agent paradigm: foundations of multi-agent-based integrative business information systems. Decision Support Systems 42(1), 48–78 (2006)CrossRefGoogle Scholar
  22. 22.
    Guo, Q., Zhang, M.: A novel approach for multi-agent-based Intelligent Manufacturing System. Information Sciences 179(18), 3079–3090 (2009)CrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Umar Manzoor
    • 1
  • Samia Nefti
    • 1
  • Yacine Rezgui
    • 2
  1. 1.Department of Computer Science, School of Computing, Science and EngineeringThe University of SalfordSalfordUnited Kingdom
  2. 2.Department of Computer Science, School of EngineeringCardiff UniversityCardiffUnited Kingdom

Personalised recommendations