Abstract
IT security is becoming an area of increasing importance especially with the increasing dependency of humans and businesses on computers and computer networks. This paper outlines a generic framework to deal with security issues. The framework proposed is based on a multi agent architecture. Each specialist task for security requirement is modeled as a specialist agent task and to address the global security tasks an environment is invoked in which the multiple agents execute their specialist skills and communicate to produce the desired behavior. This paper presents the framework and its constituent parts and discusses the characteristics of the security problems, the agent roles and how they link up. The security related areas investigated in the current study are discussed and modeled in the proposed framework.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
AusCert, Australian Computer Crime & Security Survey AusCERT (2004), http://www.auscert.org.au/download.html?f=114
Kienzle, D.M., Elder, M.C.: Recent Worms: A Survey and Trends. In: ACM Workshop on Rapid Malcode, WORM 2003, ACM, Washington (2003)
Saydjari, O.S.: Cyber Defense: Art to Science. Communications of ACM 47(3), 53–57 (2004)
Pfleeger, C.P., Pfleeger, S.L.: Security in Computing, 3rd edn. Prentice Hall, Englewood Cliffs (2003)
Bradshaw, J.M.: An Introduction to Software Agents. In: Bradshaw, J.M. (ed.) Software Agents, pp. 3–46. AAAI Press/The MIT Press (1997)
Finin, T., Labrou, Y., Mayfield, J.: KQML as an Agent Communication Language. In: Bradshaw, J. (ed.) Software Agents, MIT Press, Cambridge (1995)
O’Gorman, L.: Comparing Passwords. Proceedings of the IEEE 91(12), 2021–2040 (2003)
Bolle, R.M., et al.: Biometrics 101, IBM Research Report, IBM: IBM T. J. Hawthorne, New York, USA (2002)
Namboodiri, A.M., Jain, A.K.: On-line Script Recognition. In: Proceedings of the Sixteenth International Conference on Pattern Recognition, Quebec City, Canada (2002)
Ma, W., Sharma, D.: A Multiple Agents Based Intrusion Detection System. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3681, pp. 205–211. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sharma, D., Ma, W., Tran, D. (2005). On an IT Security Framework. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3681. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552413_33
Download citation
DOI: https://doi.org/10.1007/11552413_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28894-7
Online ISBN: 978-3-540-31983-2
eBook Packages: Computer ScienceComputer Science (R0)