Abstract
In this paper we present an approach for an agent-based early warning system (A-EWS) for critical infrastructures. In our approach we combine existing security infrastructures, e.g. firewalls or intrusion detection systems, with new detection approaches to create a global view and to determine the current threat state.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Albayrak, S., Müller, A., Scheel, C., Milosevic, D.: Combining Self-Organizing Map Algorithms for Robust and Scalable Intrusion Detection. In: Mohammadian, M. (ed.) Proceedings of International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005 Book 2), Vienna, Austria, pp. 123–130 (2005)
Bundesamt für Sicherheit in der Informationstechnik. Critical infrastructures in state and society (2006-05-16), http://www.bsi.de/fachthem/kritis/kritis_e.htm
Bundesamt für Sicherheit in der Informationstechnik. Certification Report BSI-DSZ-CC-0248-2005 for Java Intelligent Agent Componentware IV Version 4.3.11 from DAI- Labor Technische Universität Berlin (2005), http://www.bsi.de/zertifiz/zert/reporte/0248a.pdf
DAI-Labor. Security Target Java Intelligent Agent Componentware IV (2004), http://www.bsi.de/zertifiz/zert/reporte/0248b.pdf
Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T., Mead, N.R.: Survivable Network Systems: An Emerging Discipline. Technical Report CMU/SEI-97-TR-013 ESC-97-013, Software Engineering Institute, Carnegie Mellon University, Pittsburg, PA 15213 USA (November 1997)
Fricke, S., Bsufka, K., Keiser, J., Schmidt, T., Sesseler, R., Albayrak, S.: Agent-based telematic services and telecom applications. Communications of the ACM 44(4), 43–48 (2001)
Geissler, T., Kroll-Peters, O.: Applying Security Standards to Multi Agent Systems. In: The First International Workshop on Safety and Security in Multiagent Systems (SASEMAS) Part of AAMAS held at Columbia University New York City, July 20 (2004)
Hoepers, C., Steding-Jessen, K., Cordeiro, L.E.R., Chaves, M.H.P.C.: A National Early Warning Capability Based on a Network of Distributed Honeypots. In: Proceedings of the 17th Annual FIRST Conference on Computer Security Incident Handling, Singapore (June 2005)
Knight, J.C., Elder, M.C., Flinn, J., Marx, P.: Analysis of Four Critical Infrastructure Applications. Technical Report Computer Science Report No. CS-97-27, Department of Computer Science, University of Virginia (September 1998)
Kotenko, I.: Active vulnerability assessment of computer networks by simulation of complex remote attacks. In: ICCNMC 2003: International Conference on Computer Networks and Mobile Computing, 2003, October 2003, pp. 40–47 (2003)
Merola, A.: Intrusion Detection Systems-Interna. Hakin9 (4) (2005), http://www.hakin9.org
Zou, C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for internet worms. In: Proceedings of the 10th ACM conference on Computer and communication security, pp. 190–199. ACM Press, New York (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bsufka, K., Kroll-Peters, O., Albayrak, S. (2006). Intelligent Network-Based Early Warning Systems. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_9
Download citation
DOI: https://doi.org/10.1007/11962977_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69083-2
Online ISBN: 978-3-540-69084-9
eBook Packages: Computer ScienceComputer Science (R0)