Network Security Monitoring and Defense System Framework Design Using Mobile Agents based on DoDAF

被引:1
|
作者
Tong, Yan [1 ]
Zhang, Jian [1 ]
Qin, Tao [2 ]
Xu, Ming-di [1 ]
机构
[1] Wuhan Digital Engn Inst, Syst Software Dept, Wuhan, Hubei, Peoples R China
[2] Xi An Jiao Tong Univ, MoE Key Lab Intelligent Networks & Network Secur, Xian, Shaanxi, Peoples R China
来源
2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATIONS (CSA) | 2015年
基金
中国国家自然科学基金;
关键词
framework design; network security; mobile agents; DoDAF;
D O I
10.1109/CSA.2015.73
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Network security and defense plays important roles in network management system. The traditional network security monitoring systems usually employ lots of agents to collected data and then perform abnormal detection based on measurement of those data. This kind of framework needs lots of agents and usually occupies many bandwidths. Focus on this problem; we introduce the mobile agents into the network security and monitoring system. As the mobile agents are intelligent and can move to other hosts according to the monitoring task, adoption of the mobile agents will increase the flexibility of the monitoring system while reduce the number of agents. Furthermore, we employ DoDAF to make the designed framework more easily used and deployed. Firstly, we analyzed the development standards of the mobile agent, including MASIF and FIPA, then mapped them to DM2 in DoDAF. We also analyzed the elements included in the traditional network security monitoring system and mapped them to DM2. Based on those mapping works, we can obtain DM2 which should be included in different views in DoDAF. Secondly, we divided the designed architecture into four parts based on the TOGAF, including the business architecture, application architecture, data architecture and technology architecture. And extract which view which should be included in the designed framework. Finally, according to the constraint relationship between different views, we obtain the developing sequence of those views and design and develop the network security monitoring and defense system framework using the mobile agent. Based on EA, we verified the designed framework and the results show that the proposed framework is correct.
引用
收藏
页码:366 / 370
页数:5
相关论文
共 50 条
  • [1] Wrapper-based security monitoring framework in mobile agent system
    Liu, S.P.
    Zhang, S.Y.
    Wu, C.R.
    Ruan Jian Xue Bao/Journal of Software, 2001, 12 (SUPPL.): : 107 - 112
  • [2] Design of Network Security Defense System for Information System
    Li, Kexin
    Xia, Hongsen
    Zhong, Ling
    PROCEEDINGS OF ANNUAL CONFERENCE OF CHINA INSTITUTE OF COMMUNICATIONS, 2010, : 301 - 303
  • [3] Security Schemes for a Mobile Agent Based Network and System Management Framework
    Ching-hang Fong
    Gerard Parr
    Philip Morrow
    Journal of Network and Systems Management, 2011, 19 : 230 - 256
  • [4] Security Schemes for a Mobile Agent Based Network and System Management Framework
    Fong, Ching-hang
    Parr, Gerard
    Morrow, Philip
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2011, 19 (02) : 230 - 256
  • [5] Robustness and security in a mobile-agent based network monitoring system
    Tripathi, A
    Koka, M
    Karanth, S
    Osipkov, I
    Talkad, H
    Ahmed, T
    Johnson, D
    Dier, S
    INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2004, : 320 - 321
  • [6] A network management framework using mobile agents
    Lefebvre, J
    Chamberland, S
    Pierre, S
    CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS: TOWARD A CARING AND HUMANE TECHNOLOGY, 2003, : 737 - 740
  • [7] Design of Computer Network Security Defense System Based on Artificial Intelligence and Neural Network
    Bian, Lu
    WIRELESS PERSONAL COMMUNICATIONS, 2023,
  • [8] The design of the meteorological data monitoring system based on mobile network
    Hong, Zhou
    Zhou, Dongguo
    Li, Enliang
    Hu, Wenshan
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING, 2014, 113 : 266 - 270
  • [9] Study of the Security in Network Management Based on Mobile Agents
    CHEN Zhi~1 WANG Ru-chuan~(1
    2.State Key Laboratory for Novel Software Technology
    The Journal of China Universities of Posts and Telecommunications, 2004, (04) : 37 - 42
  • [10] Design of Network Security Early-Warning System Based on Network Defense in depth Model
    Liu Shengjian
    Yang Haiyan
    Wang Fengni
    PROCEEDINGS OF 2013 2ND INTERNATIONAL CONFERENCE ON MEASUREMENT, INFORMATION AND CONTROL (ICMIC 2013), VOLS 1 & 2, 2013, : 355 - 359