Network Security Monitoring and Defense System Framework Design Using Mobile Agents based on DoDAF

被引:1
|
作者
Tong, Yan [1 ]
Zhang, Jian [1 ]
Qin, Tao [2 ]
Xu, Ming-di [1 ]
机构
[1] Wuhan Digital Engn Inst, Syst Software Dept, Wuhan, Hubei, Peoples R China
[2] Xi An Jiao Tong Univ, MoE Key Lab Intelligent Networks & Network Secur, Xian, Shaanxi, Peoples R China
来源
2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATIONS (CSA) | 2015年
基金
中国国家自然科学基金;
关键词
framework design; network security; mobile agents; DoDAF;
D O I
10.1109/CSA.2015.73
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Network security and defense plays important roles in network management system. The traditional network security monitoring systems usually employ lots of agents to collected data and then perform abnormal detection based on measurement of those data. This kind of framework needs lots of agents and usually occupies many bandwidths. Focus on this problem; we introduce the mobile agents into the network security and monitoring system. As the mobile agents are intelligent and can move to other hosts according to the monitoring task, adoption of the mobile agents will increase the flexibility of the monitoring system while reduce the number of agents. Furthermore, we employ DoDAF to make the designed framework more easily used and deployed. Firstly, we analyzed the development standards of the mobile agent, including MASIF and FIPA, then mapped them to DM2 in DoDAF. We also analyzed the elements included in the traditional network security monitoring system and mapped them to DM2. Based on those mapping works, we can obtain DM2 which should be included in different views in DoDAF. Secondly, we divided the designed architecture into four parts based on the TOGAF, including the business architecture, application architecture, data architecture and technology architecture. And extract which view which should be included in the designed framework. Finally, according to the constraint relationship between different views, we obtain the developing sequence of those views and design and develop the network security monitoring and defense system framework using the mobile agent. Based on EA, we verified the designed framework and the results show that the proposed framework is correct.
引用
收藏
页码:366 / 370
页数:5
相关论文
共 50 条
  • [21] A framework for building reusable mobile agents for network management
    Satoh, I
    NOMS 2002: IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM: MANAGEMENT SOLUTIONS FOR THE NEW COMMUNICATIONS WORLD, 2002, : 51 - 64
  • [22] Network management based on mobile agents
    Jie, W
    CIC '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN COMPUTING, 2005, : 54 - 58
  • [23] Internet of things security: A multi-agent-based defense system design
    Aydin, Hakan
    Aydin, Gulsum Zeynep Gurkas
    Sertbas, Ahmet
    Aydin, Muhammed Ali
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 111
  • [24] Research and implementation of network security cooperative defense system
    An, Xifeng
    Li, Weihua
    Liu, Zun
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2008, 42 (12): : 1495 - 1499
  • [25] Honeypot: a supplemented active defense system for network security
    Zhang, F
    Zhou, SJ
    Qin, ZG
    Liu, JD
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 231 - 235
  • [26] Design and Implementation of Enterprise Network Security System Based on Firewall
    Yuan, Hui
    Zheng, Lei
    Qiu, Shuang
    Peng, Xiangli
    Liang, Yuan
    Hu, Yaodong
    Deng, Guoru
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 1070 - 1078
  • [27] Network Security Analysis and Design of Medical Information System Based on
    Chang, M. J.
    Jia, X.
    FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 502 - 506
  • [28] A dynamic policy based security architecture for mobile agents
    Mubarak, Misbah
    Khan, Zarrar
    Sultana, Sara
    Asghar, Hajra Batool
    Ahmad, H. Farooq
    Suguri, Hiroki
    Jabeen, Fakhra
    NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 493 - +
  • [29] Campus network security analysis and design of security system
    Ji, Song
    Pang, Ling
    Xia, WenYing
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1064 - 1067
  • [30] Cloud Network Security Monitoring and Response System
    Mukhtarov, Murat
    Miloslavskaya, Natalia
    Tolstoy, Alexander
    THIRD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, GRIDS, AND VIRTUALIZATION (CLOUD COMPUTING 2012), 2012, : 181 - 185