Abstract
An environment for devices to collect, process, and communicate information is made possible by the Internet of Intelligence. The data that is shared could be private, sensitive, financial, or necessary for regular business operations. Using intrusion detection and prevention techniques is necessary to prevent unauthorized access and ensure the proper operation of the Internet of Intelligence. Intrusion detection is frequently used as a second line of defense to safeguard computer networks, in addition to intrusion prevention techniques such as authentication, firewalls, and cryptography that are used as a first line of defense. The crucial topic of security management is the main emphasis of this chapter. One of the most important issues in network security management today is intrusion detection. A few current systems are reexamined to highlight their benefits and drawbacks. The technology of multi-agent systems can be helpful for effectively developing and maintaining secured networks. Features such as autonomy, adaptability, and flexibility of the intelligent agent system allow the management of wireless network evolution in a more controlled way.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
K. Indermaur, Baby steps. Byte, 97–104 (1995)
G. O’Hares, N. Jennings, Foundations of Distributed Artificial Intelligence (Wiley, 1996)
K. Boudaoud, H. Labiod, J. Labetoulle, Towards a New Approach for Intrusion Detection with Intelligent Agents (Eurecome Institute Corporate and Mobile Communications Laboratories, Sophia- Antipolis, 2000)
K. Alagha, H. Labiod, A new approach towards an adaptive wireless ATM network. ACM MONET J., Baltzer Publishers 4(2) (1999)
R. Heady, G. Luger, A. Maccabe, M. Servilla, The Architecture of a Network Level Intrusion Detection System: Technical Report (University of New Mexico, Department of Computer Science, 1990)
L.T. Heberlein, B. Mukherjee, K.N. Levitt, Network intrusion detection. IEEE Netw. J. 8, 26–41 (1994)
K. Price, Intrusion Detection Pages, Purdue University, http://www.cs.purdue.edu/coast/intrusion-detection/ids.html.1998
G.B. White, E.A. Fisch, U.W. Pooch, Co-operating security managers: A peer-based intrusion detection system. IEEE Netw. J. 10, 20–23 (1996)
N.R. Jennings, K. Sycara, M.J. Wooldridge, A Roadmap of Agent Research and Development: Autonomous Agents and Multi-Agent Systems (1998)
M.N. Huhns, Multi-agent Systems. Tutorial at the European Agent Systems Summer School (EASSS’99) (1999)
I. Satoh, Building reusable mobile agents for network management. IEEE J. (2003)
M. Wooldridge, N.R. Jennings, Intelligent agents: Theory and practice. Knowl. Eng. Rev. 10, 115 (1995)
B. Bieszczad, T. Pagurek, T. White, Mobile agents for network management. IEEE Commun. Surv. 1, 2 (1998)
T.C. Du, E.Y. Li, A.P. Chang, Mobile agents in distributed network management. Commun. ACM 46, 127 (2003)
C. Bohoris, G. Pavlou, H. Cruickshank, Using mobile agents for network performance management, in Proceedings of the IFIP/ IEEE, Network Operations and Management Symposium (NOMS’00), (Hawaii, U.S.A, 2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Odhiambo, M.O., Mwashita, W. (2024). Security Provision for the Internet of Intelligence Using Autonomous Mobile Agents. In: Odhiambo, M.O., Mwashita, W. (eds) From Internet of Things to Internet of Intelligence. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-031-55718-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-031-55718-7_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-55717-0
Online ISBN: 978-3-031-55718-7
eBook Packages: EngineeringEngineering (R0)