Dynamic Distributed Information Security System based on Multi-Agent

被引:2
作者
Wang Peng [1 ]
机构
[1] Natl Univ Def Technol, Coll Informat Syst & Management, Changsha 410073, Hunan, Peoples R China
来源
COMPONENTS, PACKAGING AND MANUFACTURING TECHNOLOGY | 2011年 / 460-461卷
关键词
information security; multi-agent; dynamic system; distributed system; RISK ANALYSIS;
D O I
10.4028/www.scientific.net/KEM.460-461.433
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the growing population of using public network, network intrusion events happened more frequently. Aim to the drawbacks of traditional information security methods, the multi-agent system model was proved to be very promising. This paper proposes a dynamic distributed information security system based on multi-agent that dynamically integrates all distributed information security facilities to achieve efficiently collaborative information security. In order to validate this proposed approach, the authors give the material experiment test in the end of this paper. The final experiment result suggests that, this proposed approach is feasible, correct and valid.
引用
收藏
页码:433 / 438
页数:6
相关论文
共 8 条
  • [1] Remote attack detection method in IDA: MLSI-based intrusion detection using discriminant analysis
    Asaka, M
    Onabura, T
    Inoue, T
    Goto, S
    [J]. 2002 SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT 2002), PROCEEDINGS, 2002, : 64 - 73
  • [2] Operationalizing IT risk management
    Coles, RS
    Moulton, R
    [J]. COMPUTERS & SECURITY, 2003, 22 (06) : 487 - 493
  • [3] AN INTRUSION-DETECTION MODEL
    DENNING, DE
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232
  • [4] From risk analysis to security requirements
    Gerber, M
    von Solms, R
    [J]. COMPUTERS & SECURITY, 2001, 20 (07) : 577 - 584
  • [5] Intelligent agents for intrusion detection
    Helmer, GG
    Wong, JSK
    Honavar, V
    Miller, L
    [J]. 1998 IEEE INFORMATION TECHNOLOGY CONFERENCE, PROCEEDINGS, 1998, : 121 - 124
  • [6] Extending the risk analysis model to include market-insurance
    Reid, RC
    Floyd, SA
    [J]. COMPUTERS & SECURITY, 2001, 20 (04) : 331 - 339
  • [7] Intrusion detection using autonomous agents
    Spafford, EH
    Zamboni, D
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2000, 34 (04): : 547 - 570
  • [8] Incremental information security certification
    von Solms, B
    von Solms, R
    [J]. COMPUTERS & SECURITY, 2001, 20 (04) : 308 - 310