Abstract
In this paper, an integrated multi-agent approach to construction of Network Security System (NSS) is considered. The NSS consists of a multitude of specialized intelligent agents that are distributed over the computer network. The architecture of the NSS is outlined. Emphasis is given to a description of the operation and learning mechanisms implemented in the security agents.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35515-3_53
Chapter PDF
Similar content being viewed by others
Key words
References
R.Agrawal, T.Imielinski, A.Swami. Mining association rules between sets of items in large databases. In Proceedings of the ACM SIGMOD Conference on Management of Data, 1993.
J.Balasubramaniyan, J.Garcia-Fernandez, D.Isakoff, E.Spafford, D.Zamboni. An Architecture for Intrusion Detection using Autonomous Agents. In Proceedings of the 14th Annual Computer Security Applications Conference. Phoenix, Arizona. 1998.
W.W.Cohen. Fast effective rule induction. In Machine Learning: the 12th International Conference, Lake Taho, CA, 1995.
V.I.Gorodetski, L.J.Popyack, I.V.Kotenko, V.A.Skormin. Ontology-based Multi-agent Model of Information Security System. In Lecture Notes in Artificial Intelligence, vol. 1711. 1999.
V.Gorodetski, O.Karsaev. Algorithm of Rule Extraction from Learning Data. In Proceedings of the 8th International Conference “Expert Systems Application & Artificial Intelligence” (EXPERSYS-96). IITT International, Paris, France. 1996.
N.Guarino. Formal ontology, conceptual analysis and knowledge representation. In Int. J. Human-Computer Studies, No. 43, 1995.
Hochberg et al. “NADIR”: An Automated System for Detecting Network Intrusion and Misuse. In Computers and Security,vol.12, No.3, 1993.
S.Kumar, E.H.Spafford. A software architecture to support misuse intrusion detection. In Proceedings of the 18th National Information Security Conference, 1995.
T.Lane, C.E.Brodley. Sequence matching and learning in anomaly detection for computer security. In Proceedings of the AAAI Workshop:AI Approaches to Fraud Detection and Risk Management AAAI Press,1997.
W.Lee, S.J.Stolfo, K.Mok. A Data mining Framework for Building Intrusion Detection Model. In Proceedings of the IEEE Symposium on Security and Privacy, 1999.
H.Mannila, H.Toivonen. Discovering generalised episodes using minimal occurrences. In Proceedings of the 2nd International Conference on Knowledge Discovery in Databases and Data Mining, Portland, Oregon, August 1996.
V.Paxon. Bro: A system for detecting network intruders in real time. In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, 1998.
G.White, E.Fish, U.Pooch. Cooperating Security Managers: A Peer-Based Intrusion Detection System. In IEEE Network, January/February 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this paper
Cite this paper
Gorodetski, V., Kotenko, I., Skormin, V. (2000). Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents’ Community. In: Qing, S., Eloff, J.H.P. (eds) Information Security for Global Information Infrastructures. SEC 2000. IFIP — The International Federation for Information Processing, vol 47. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35515-3_30
Download citation
DOI: https://doi.org/10.1007/978-0-387-35515-3_30
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5479-7
Online ISBN: 978-0-387-35515-3
eBook Packages: Springer Book Archive