Advertisement

Approach to Solving Security Problems Using Meta-Agents in Multi Agent System

  • Esmiralda Moradian
  • Anne Håkansson
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4953)

Abstract

In this paper, we present an approach of integrating meta-agents in Web Services. Web Services requires an appropriate level of security to support business systems to be used by anyone, anywhere, at anytime and any platform. However, the increased use of distributed systems with message passing produces a growing set of security problems. This especially concerns threats and attacks on Web Services consisting of transactions with valuable resources. To prevent possible attacks on Web Services, we propose using meta-agents over software agents in a multi-agent system. The multi-agent system consists of a network of software agents that secure the message passing at the transport and application levels. To avoid attacks on these agents, we use meta-agents to monitor the software agents’ actions and then to direct the software agents’ work. These meta-agents are also used to handle unexpected events in the actions of the software agents.

Keywords

Software agents meta-agents intelligent agents multi-agent systems networks Web Services SOAP security reliability auditing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Fasli, M.: On agent technology for e-commerce: trust, security and legal issues. The Knowledge Engineering Review 22(1), 3–35 (2007)CrossRefGoogle Scholar
  2. 2.
    Gorodetski, V., Kotenko, I.: The multi-agent systems for computer network security assurance: frameworks and case studies. In (ICAIS 2002). IEEE International Conference on Artificial Intelligence Systems, pp. 297–302 (2002), ISBN: 0-7695-1733-1Google Scholar
  3. 3.
    Håkansson, A., Hartung, R.: Using Meta-Agents for Multi-Agents in Networks. In: Arabnia, H., et al. (eds.) Proceedings of The 2007 International Conference on Artificial Intelligence, ICAI 2007, vol. II, pp. 561–567. CSREA Press, U.S.A (2007a), www.world-academy-of-science.org Google Scholar
  4. 4.
    Håkansson, A., Hartung, R.: Calculating optimal decision using Meta-level agents for Multi-Agents in Networks. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part I. LNCS (LNAI), vol. 4692, pp. 180–188. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  5. 5.
    Moradian, E., Håkansson, A.: Possible attacks on XML Web Services (IJCSNS) International Journal of Computer Science and Network Security 6(1B) (2006), Journal ISSN: 1738-7906Google Scholar
  6. 6.
    Pedireddy, T., Vidal, J.M.: A Prototype MultiAgent Network Security System. In: AAMAS 2003 Proceedings of the second international joint conference on Autonomous agents and multiagent systems, Melbourne, Australia, July 14 - 18 (2003)Google Scholar
  7. 7.
    W3C XML Protocol Working Group, http://www.w3.org/TR/
  8. 8.
    Nielsen, H.F., Thatte, S.: Web Services Routing Protocol (WS-Routing), http://msdn2.microsoft.com/en-us/library/ms951249.aspx
  9. 9.
    Adsett, C., Bernardi, A., Liu, S., Spencer, B.: Realising Weak Work Workflow with Declarative Flexible XML Routing in SOAP (DeFleX) (2004)Google Scholar
  10. 10.
    Chelberg, D., Welch, L., Lakshmikumar, A., Gillen, M.: Meta-Reasoning For a Distributed Agent Architecture. In: Proceedings of the South-Eastern Symposium on System Theory, Athens, Ohio, USA, March 18-20, 2001, pp. 377–381 (2001)Google Scholar
  11. 11.
    Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach. Prentice-Hall, Inc., Englewood Cliffs (1995)zbMATHGoogle Scholar
  12. 12.
    Wooldridge, M.J.: Introduction To Multi-Agent Systems. John Wiley and Sons Ltd., Chichester (2002)CrossRefGoogle Scholar
  13. 13.
    O’Neil, M.: Web Services Security. McGraw-Hill/Osborne, New York (2003)Google Scholar
  14. 14.
    Hartman, B., Flinn, D.J., Beznosov, K., Kawamoto, S.: Mastering Web Services Security. Wiley, Chichester (2003)Google Scholar
  15. 15.
    Peterson, G.: Security Concepts, Challenges, and Design Considerations for Web Services Integration, Cigital, Inc.; Howard Lipson, Software Engineering Institute (2006), https://buildsecurityin.us-cert.gov/daisy/bsi/articles/best-practices/assembly/639.html
  16. 16.
    Demchenko, Y.: Attacks on Web Services and Grids. White paper (2004)Google Scholar
  17. 17.
    Papazoglou, M.: Web Services: Principles and Technology. Pearson Education, Essex England (2008)Google Scholar
  18. 18.
    Rosenberg, J., Remy, D.: Securing Web Services with WS-security (2004), ISBN 0-672-32651-5Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Esmiralda Moradian
    • 1
  • Anne Håkansson
    • 1
  1. 1.Department of Information Science, Computer ScienceUppsala UniversityUppsalaSweden

Personalised recommendations