SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
6 th  Int. Conf. On Knowledge-Based Intelligent Information & Engineering Systems (KES 2002) Podere d’Ombriano, Crema, Italy Amparo Alonso Betanzos Bertha Guijarro Berdiñas Juan A. Suárez Romero A Multi-Agent Architecture for Intrusion Detection Laboratory for Research and Development in Artificial Intelligence Department of Computer Science Faculty of Informatics University of A Coruña, Spain
Intrusion Detection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Agents!
AAFID ,[object Object],Agent J Agent G Transceiver E User interface Monitor A Filter Monitor B Transceiver C Transceiver D Agent F Agent H Agent I
AAFID - Drawbacks ,[object Object],Agent J Agent G Transceiver E User interface Monitor A Filter Monitor B Transceiver C Transceiver D Agent F Agent H Agent I
AAFID - Drawbacks ,[object Object],Agent J Agent G Transceiver E User interface Monitor A Filter Monitor B Transceiver C Transceiver D Agent F Agent H Agent I
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Our proposal This needs more  knowledge !
Two types of knowledge ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Proposed Architecture
Information Agents
Information Agents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prevention Agents
Prevention Agents ,[object Object],[object Object],[object Object],[object Object],[object Object]
Detection Agents
Detection Agents ,[object Object],[object Object],[object Object],[object Object],[object Object]
Response Agents
Response Agents ,[object Object],[object Object]
Evidence-Search Agents
Evidence-Search Agents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Interface Agents
Interface Agents ,[object Object],[object Object],[object Object],[object Object]
Special Agents
Special Agents ,[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
6 th  Int. Conf. On Knowledge-Based Intelligent Information & Engineering Systems (KES 2002) Podere d’Ombriano, Crema, Italy Amparo Alonso Betanzos Bertha Guijarro Berdiñas Juan A. Suárez Romero A Multi-Agent Architecture for Intrusion Detection Laboratory for Research and Development in Artificial Intelligence Department of Computer Science Faculty of Informatics University of A Coruña, Spain T h a n k  y o u  f o r  y o u r  a t t e n d a n c e !

Contenu connexe

En vedette

Multi agent system for knowledge management in SCM
Multi agent system for knowledge management in SCMMulti agent system for knowledge management in SCM
Multi agent system for knowledge management in SCMGeorge Ogrinja
 
Models for a Multi-Agent System Based on Wasp-Like Behaviour for Distributed ...
Models for a Multi-Agent System Based on Wasp-Like Behaviour for Distributed ...Models for a Multi-Agent System Based on Wasp-Like Behaviour for Distributed ...
Models for a Multi-Agent System Based on Wasp-Like Behaviour for Distributed ...infopapers
 
Applicability of Interactive Genetic Algorithms to Multi-agent Systems: Exper...
Applicability of Interactive Genetic Algorithms to Multi-agent Systems: Exper...Applicability of Interactive Genetic Algorithms to Multi-agent Systems: Exper...
Applicability of Interactive Genetic Algorithms to Multi-agent Systems: Exper...Yomna Mahmoud Ibrahim Hassan
 
Blending Event-Based and Multi-Agent Systems around Coordination Abstractions
Blending Event-Based and Multi-Agent Systems around Coordination AbstractionsBlending Event-Based and Multi-Agent Systems around Coordination Abstractions
Blending Event-Based and Multi-Agent Systems around Coordination AbstractionsAndrea Omicini
 
Federal Mutil-Agent System (FEDMAS)
Federal Mutil-Agent System (FEDMAS)Federal Mutil-Agent System (FEDMAS)
Federal Mutil-Agent System (FEDMAS)COL Vernon Myers
 
Interactions in Multi Agent Systems
Interactions in Multi Agent SystemsInteractions in Multi Agent Systems
Interactions in Multi Agent SystemsSSA KPI
 
Event-Based vs. Multi-Agent Systems: Towards a Unified Conceptual Framework. ...
Event-Based vs. Multi-Agent Systems: Towards a Unified Conceptual Framework. ...Event-Based vs. Multi-Agent Systems: Towards a Unified Conceptual Framework. ...
Event-Based vs. Multi-Agent Systems: Towards a Unified Conceptual Framework. ...Andrea Omicini
 
A Multi-Agent System Approach to Load-Balancing and Resource Allocation for D...
A Multi-Agent System Approach to Load-Balancing and Resource Allocation for D...A Multi-Agent System Approach to Load-Balancing and Resource Allocation for D...
A Multi-Agent System Approach to Load-Balancing and Resource Allocation for D...Soumya Banerjee
 
Multi-agent Control of Thermal Systems in Buildings
Multi-agent Control of Thermal Systems in BuildingsMulti-agent Control of Thermal Systems in Buildings
Multi-agent Control of Thermal Systems in BuildingsBenoit Lacroix
 
Event-Based vs. Multi-Agent Systems: Towards a Unified Conceptual Framework
Event-Based vs. Multi-Agent Systems: Towards a Unified Conceptual FrameworkEvent-Based vs. Multi-Agent Systems: Towards a Unified Conceptual Framework
Event-Based vs. Multi-Agent Systems: Towards a Unified Conceptual FrameworkAndrea Omicini
 
Evaluation of recommender technology using multi agent simulation
Evaluation of recommender technology using multi agent simulationEvaluation of recommender technology using multi agent simulation
Evaluation of recommender technology using multi agent simulationZina Petrushyna
 
BBL multi agent systems
BBL multi agent systemsBBL multi agent systems
BBL multi agent systemsCédric BURON
 
Multi-agent systems
Multi-agent systemsMulti-agent systems
Multi-agent systemsR A Akerkar
 
Introduction to Agents and Multi-agent Systems (lecture slides)
Introduction to Agents and Multi-agent Systems (lecture slides)Introduction to Agents and Multi-agent Systems (lecture slides)
Introduction to Agents and Multi-agent Systems (lecture slides)Dagmar Monett
 
Lecture 5 - Agent communication
Lecture 5 - Agent communicationLecture 5 - Agent communication
Lecture 5 - Agent communicationAntonio Moreno
 
Lecture 4- Agent types
Lecture 4- Agent typesLecture 4- Agent types
Lecture 4- Agent typesAntonio Moreno
 
Introduction to agents and multi-agent systems
Introduction to agents and multi-agent systemsIntroduction to agents and multi-agent systems
Introduction to agents and multi-agent systemsAntonio Moreno
 

En vedette (19)

Multi agent system for knowledge management in SCM
Multi agent system for knowledge management in SCMMulti agent system for knowledge management in SCM
Multi agent system for knowledge management in SCM
 
Models for a Multi-Agent System Based on Wasp-Like Behaviour for Distributed ...
Models for a Multi-Agent System Based on Wasp-Like Behaviour for Distributed ...Models for a Multi-Agent System Based on Wasp-Like Behaviour for Distributed ...
Models for a Multi-Agent System Based on Wasp-Like Behaviour for Distributed ...
 
Applicability of Interactive Genetic Algorithms to Multi-agent Systems: Exper...
Applicability of Interactive Genetic Algorithms to Multi-agent Systems: Exper...Applicability of Interactive Genetic Algorithms to Multi-agent Systems: Exper...
Applicability of Interactive Genetic Algorithms to Multi-agent Systems: Exper...
 
Type 2 fuzzy ontology ahmadchan
Type 2 fuzzy ontology ahmadchanType 2 fuzzy ontology ahmadchan
Type 2 fuzzy ontology ahmadchan
 
Blending Event-Based and Multi-Agent Systems around Coordination Abstractions
Blending Event-Based and Multi-Agent Systems around Coordination AbstractionsBlending Event-Based and Multi-Agent Systems around Coordination Abstractions
Blending Event-Based and Multi-Agent Systems around Coordination Abstractions
 
Federal Mutil-Agent System (FEDMAS)
Federal Mutil-Agent System (FEDMAS)Federal Mutil-Agent System (FEDMAS)
Federal Mutil-Agent System (FEDMAS)
 
Interactions in Multi Agent Systems
Interactions in Multi Agent SystemsInteractions in Multi Agent Systems
Interactions in Multi Agent Systems
 
Event-Based vs. Multi-Agent Systems: Towards a Unified Conceptual Framework. ...
Event-Based vs. Multi-Agent Systems: Towards a Unified Conceptual Framework. ...Event-Based vs. Multi-Agent Systems: Towards a Unified Conceptual Framework. ...
Event-Based vs. Multi-Agent Systems: Towards a Unified Conceptual Framework. ...
 
I 7
I 7I 7
I 7
 
A Multi-Agent System Approach to Load-Balancing and Resource Allocation for D...
A Multi-Agent System Approach to Load-Balancing and Resource Allocation for D...A Multi-Agent System Approach to Load-Balancing and Resource Allocation for D...
A Multi-Agent System Approach to Load-Balancing and Resource Allocation for D...
 
Multi-agent Control of Thermal Systems in Buildings
Multi-agent Control of Thermal Systems in BuildingsMulti-agent Control of Thermal Systems in Buildings
Multi-agent Control of Thermal Systems in Buildings
 
Event-Based vs. Multi-Agent Systems: Towards a Unified Conceptual Framework
Event-Based vs. Multi-Agent Systems: Towards a Unified Conceptual FrameworkEvent-Based vs. Multi-Agent Systems: Towards a Unified Conceptual Framework
Event-Based vs. Multi-Agent Systems: Towards a Unified Conceptual Framework
 
Evaluation of recommender technology using multi agent simulation
Evaluation of recommender technology using multi agent simulationEvaluation of recommender technology using multi agent simulation
Evaluation of recommender technology using multi agent simulation
 
BBL multi agent systems
BBL multi agent systemsBBL multi agent systems
BBL multi agent systems
 
Multi-agent systems
Multi-agent systemsMulti-agent systems
Multi-agent systems
 
Introduction to Agents and Multi-agent Systems (lecture slides)
Introduction to Agents and Multi-agent Systems (lecture slides)Introduction to Agents and Multi-agent Systems (lecture slides)
Introduction to Agents and Multi-agent Systems (lecture slides)
 
Lecture 5 - Agent communication
Lecture 5 - Agent communicationLecture 5 - Agent communication
Lecture 5 - Agent communication
 
Lecture 4- Agent types
Lecture 4- Agent typesLecture 4- Agent types
Lecture 4- Agent types
 
Introduction to agents and multi-agent systems
Introduction to agents and multi-agent systemsIntroduction to agents and multi-agent systems
Introduction to agents and multi-agent systems
 

Similaire à A Multi-Agent Architecture for Intrusion Detection

A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsA Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsCSCJournals
 
Internal security on an ids based on agents
Internal security on an ids based on agentsInternal security on an ids based on agents
Internal security on an ids based on agentscsandit
 
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSINTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTScscpconf
 
Distributed network security management
Distributed network security managementDistributed network security management
Distributed network security managementSwati Sinha
 
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSINTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSIJNSA Journal
 
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSINTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSIJNSA Journal
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromeSAT Publishing House
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Shakeel Ali
 
A Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection SystemA Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection SystemLindsey Sais
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemIOSR Journals
 
Ceis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paperCeis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paperAlexander Decker
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptxRavikumarVadana
 
Presentation2.pptTTTTTTTTTTTTTTTTTTTTTTT
Presentation2.pptTTTTTTTTTTTTTTTTTTTTTTTPresentation2.pptTTTTTTTTTTTTTTTTTTTTTTT
Presentation2.pptTTTTTTTTTTTTTTTTTTTTTTTnaveenkumarrs6361681
 
Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios ijcsa
 
Autonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer NetworksAutonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer Networksijsrd.com
 

Similaire à A Multi-Agent Architecture for Intrusion Detection (20)

A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsA Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
 
Internal security on an ids based on agents
Internal security on an ids based on agentsInternal security on an ids based on agents
Internal security on an ids based on agents
 
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSINTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
 
Distributed network security management
Distributed network security managementDistributed network security management
Distributed network security management
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSINTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
 
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSINTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
 
Introductionto agents
Introductionto agentsIntroductionto agents
Introductionto agents
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents from
 
16190734.ppt
16190734.ppt16190734.ppt
16190734.ppt
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
A Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection SystemA Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection System
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection System
 
Ceis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paperCeis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paper
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
Presentation2.pptTTTTTTTTTTTTTTTTTTTTTTT
Presentation2.pptTTTTTTTTTTTTTTTTTTTTTTTPresentation2.pptTTTTTTTTTTTTTTTTTTTTTTT
Presentation2.pptTTTTTTTTTTTTTTTTTTTTTTT
 
Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios
 
Autonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer NetworksAutonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer Networks
 
Data security
Data securityData security
Data security
 

Plus de Juan A. Suárez Romero

Graphics stack updates for Raspberry Pi devices (FOSDEM 2024)
Graphics stack updates for Raspberry Pi devices (FOSDEM 2024)Graphics stack updates for Raspberry Pi devices (FOSDEM 2024)
Graphics stack updates for Raspberry Pi devices (FOSDEM 2024)Juan A. Suárez Romero
 
On-going challenges in the Raspberry Pi driver stack: OpenGL 3, Vulkan and mo...
On-going challenges in the Raspberry Pi driver stack: OpenGL 3, Vulkan and mo...On-going challenges in the Raspberry Pi driver stack: OpenGL 3, Vulkan and mo...
On-going challenges in the Raspberry Pi driver stack: OpenGL 3, Vulkan and mo...Juan A. Suárez Romero
 
Writing multimedia applications with Grilo
Writing multimedia applications with GriloWriting multimedia applications with Grilo
Writing multimedia applications with GriloJuan A. Suárez Romero
 
Grilo: Easy Access to Online Multimedia Content
Grilo: Easy Access to Online Multimedia ContentGrilo: Easy Access to Online Multimedia Content
Grilo: Easy Access to Online Multimedia ContentJuan A. Suárez Romero
 
Logical Volume Manager. An Introduction
Logical Volume Manager. An IntroductionLogical Volume Manager. An Introduction
Logical Volume Manager. An IntroductionJuan A. Suárez Romero
 
Una Arquitectura Multiagente Inteligente para la Detección de Intrusos
Una Arquitectura Multiagente Inteligente para la Detección de IntrusosUna Arquitectura Multiagente Inteligente para la Detección de Intrusos
Una Arquitectura Multiagente Inteligente para la Detección de IntrusosJuan A. Suárez Romero
 
An add-on for managing behaviours with priority in JADE
An add-on for managing behaviours with priority in JADEAn add-on for managing behaviours with priority in JADE
An add-on for managing behaviours with priority in JADEJuan A. Suárez Romero
 
Integrating a Priority-Based Scheduler of Behaviours in JADE
Integrating a Priority-Based Scheduler of Behaviours in JADEIntegrating a Priority-Based Scheduler of Behaviours in JADE
Integrating a Priority-Based Scheduler of Behaviours in JADEJuan A. Suárez Romero
 
A New Learning Method for Single Layer Neural Networks Based on a Regularized...
A New Learning Method for Single Layer Neural Networks Based on a Regularized...A New Learning Method for Single Layer Neural Networks Based on a Regularized...
A New Learning Method for Single Layer Neural Networks Based on a Regularized...Juan A. Suárez Romero
 
A Tool for Agent Communication in Mozart/Oz
A Tool for Agent Communication in Mozart/OzA Tool for Agent Communication in Mozart/Oz
A Tool for Agent Communication in Mozart/OzJuan A. Suárez Romero
 

Plus de Juan A. Suárez Romero (16)

Graphics stack updates for Raspberry Pi devices (FOSDEM 2024)
Graphics stack updates for Raspberry Pi devices (FOSDEM 2024)Graphics stack updates for Raspberry Pi devices (FOSDEM 2024)
Graphics stack updates for Raspberry Pi devices (FOSDEM 2024)
 
On-going challenges in the Raspberry Pi driver stack: OpenGL 3, Vulkan and mo...
On-going challenges in the Raspberry Pi driver stack: OpenGL 3, Vulkan and mo...On-going challenges in the Raspberry Pi driver stack: OpenGL 3, Vulkan and mo...
On-going challenges in the Raspberry Pi driver stack: OpenGL 3, Vulkan and mo...
 
Writing multimedia applications with Grilo
Writing multimedia applications with GriloWriting multimedia applications with Grilo
Writing multimedia applications with Grilo
 
Grilo: Easy Access to Online Multimedia Content
Grilo: Easy Access to Online Multimedia ContentGrilo: Easy Access to Online Multimedia Content
Grilo: Easy Access to Online Multimedia Content
 
Grilo: present and future
Grilo: present and futureGrilo: present and future
Grilo: present and future
 
Rygel-Grilo
Rygel-GriloRygel-Grilo
Rygel-Grilo
 
MSL2008. Debugging
MSL2008. DebuggingMSL2008. Debugging
MSL2008. Debugging
 
MSL2009. Valgrind
MSL2009. ValgrindMSL2009. Valgrind
MSL2009. Valgrind
 
MSL2009. Gdb
MSL2009. GdbMSL2009. Gdb
MSL2009. Gdb
 
Logical Volume Manager. An Introduction
Logical Volume Manager. An IntroductionLogical Volume Manager. An Introduction
Logical Volume Manager. An Introduction
 
Una Arquitectura Multiagente Inteligente para la Detección de Intrusos
Una Arquitectura Multiagente Inteligente para la Detección de IntrusosUna Arquitectura Multiagente Inteligente para la Detección de Intrusos
Una Arquitectura Multiagente Inteligente para la Detección de Intrusos
 
An add-on for managing behaviours with priority in JADE
An add-on for managing behaviours with priority in JADEAn add-on for managing behaviours with priority in JADE
An add-on for managing behaviours with priority in JADE
 
Integrating a Priority-Based Scheduler of Behaviours in JADE
Integrating a Priority-Based Scheduler of Behaviours in JADEIntegrating a Priority-Based Scheduler of Behaviours in JADE
Integrating a Priority-Based Scheduler of Behaviours in JADE
 
A New Learning Method for Single Layer Neural Networks Based on a Regularized...
A New Learning Method for Single Layer Neural Networks Based on a Regularized...A New Learning Method for Single Layer Neural Networks Based on a Regularized...
A New Learning Method for Single Layer Neural Networks Based on a Regularized...
 
A Tool for Agent Communication in Mozart/Oz
A Tool for Agent Communication in Mozart/OzA Tool for Agent Communication in Mozart/Oz
A Tool for Agent Communication in Mozart/Oz
 
The KNITTER System: KQML for Erlang
The KNITTER System: KQML for ErlangThe KNITTER System: KQML for Erlang
The KNITTER System: KQML for Erlang
 

Dernier

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 

Dernier (20)

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 

A Multi-Agent Architecture for Intrusion Detection

  • 1. 6 th Int. Conf. On Knowledge-Based Intelligent Information & Engineering Systems (KES 2002) Podere d’Ombriano, Crema, Italy Amparo Alonso Betanzos Bertha Guijarro Berdiñas Juan A. Suárez Romero A Multi-Agent Architecture for Intrusion Detection Laboratory for Research and Development in Artificial Intelligence Department of Computer Science Faculty of Informatics University of A Coruña, Spain
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 10.
  • 12.
  • 14.
  • 16.
  • 18.
  • 20.
  • 22.
  • 23.
  • 24. 6 th Int. Conf. On Knowledge-Based Intelligent Information & Engineering Systems (KES 2002) Podere d’Ombriano, Crema, Italy Amparo Alonso Betanzos Bertha Guijarro Berdiñas Juan A. Suárez Romero A Multi-Agent Architecture for Intrusion Detection Laboratory for Research and Development in Artificial Intelligence Department of Computer Science Faculty of Informatics University of A Coruña, Spain T h a n k y o u f o r y o u r a t t e n d a n c e !

Notes de l'éditeur

  1. Thank you very much I’m going to present here the design lines of a multi-agent architecture for intrusion detection Press key ...
  2. Firstly, what is intrusion detection? It’s the task performed in order to discover individuals who either use a system without authorization or misuse a system So, an intrusion detection system should include the following desired features First, it should be fault tolerant, in the sense that if some elements fail then the system should continue to function more or less correctly Second, it should resist the attacks performed by an intruder And last, it should be adaptable and configurable Press key ... One of the best choices to accomplish these features is the use of agents Press key ...
  3. The first system that used agents in order to detect intrusions was AAFID , developed by Purdue University , autonomous agents for intrusion detection We can see in this slide its architecture In each machine we have several agents that collect information, either directly from the machine or from a filter Each agent sends its collected information to a transceiver, which consolidates this information and sends it to a monitor The monitors perform the intrusion detection, and they can be structured hierarchically Finally, the top level monitor sends its results to the user interface, through which the user interactuates with the system The main drawback of AAFID is its rigid architecture Press key ...
  4. First, the information flows in a rigid manner Agents send their information to a transceiver, this transceiver to a monitor, this monitor to other monitors, and so on, until results reach the user interface Press key ...
  5. So there are nodes in the architecture that are more critical that others For example, if this monitor fails all the elements besides this monitor also fails, because the information flow is broken Press key ...
  6. In order to avoid these problems, we propose the design lines of a more flexible architecture that is mainly based on AAFID It uses agents too, and it includes the functionality of AAFID’s agents Also, it extends it including new types of agents that perform different tasks and, what is important, using dynamic relationships, so the agents, in principle, can relate with any other agent They choice their partners in order to accomplish their goals Press key ... But this implies the need for more knowledge to be included in our system Press key ...
  7. The knowledge in our proposal is of two types First we have the domain knowledge, the knowledge that the agents use in order to do their tasks Each agent would use different type of domain knowledge depending on its goals Though in AAFID agents could use domain knowledge, actually only monitors use it In our proposal all agents would use domain knowledge Second we have the social knowledge In our proposal the agents collaborate among them by dynamic relationships To establish these relationships they need to know which ones are the agents to communicate with, and how to set up the relations: this knowledge is the social knowledge This communication is performed using an Agent Communication Language Press key ...
  8. We can see here our proposed architecture, in which there is not a predetermined flow of information As we said, there are some agents that we can find in AAFID, and other types of agents that are new Let’s see each type of them Press key ...
  9. First we have the information agents, that are also present in AAFID Press key ...
  10. The information agents provide information to our system From several sources (logs, connections, and so on) And in a standard format So the information agents isolate the protected hardware and software from our system, making portability easier. Due to the different tasks in our system, there are different needs of information Thus information agents would form dynamic groups in order to satisfy these different needs For instance, we could have two information agents that provide two different types of information A third agent could provide a higher level of information summing up the information supplied by the other two agents This is similar to transceivers and agents in AAFID Press key ...
  11. Next we have prevention agents Press key ...
  12. That preclude or severely handicap the likelihood of a particular intrusion’s success This kind of agents doesn’t exist in AAFID Today, prevention is the most deployed aspect of security in organizations: there are firewalls, cryptography, and so on So our idea is to integrate this readily available elements in our architecture This is done by encapsulating them in prevention agents Press key ...
  13. Also we have detection agents, that correspond with the monitors in AAFID Press key ...
  14. These agents try to find attempts of intrusions or successful intrusions Our proposal is to have a population of detection agents using different detection techniques As we can notice on the background, the detection agents can establish groups among them This groups have two distinct goals Firstly, they can make a hierarchical structure so that they monitor different levels of the protected system For instance, we could have a network formed by several machines. Each machine could have one or more detection agents that are in charge of finding intrusions related with that machine . Now it could be formed a group in which an top level agent would try to find intrusions related with all the network This kind of goal is the same as in AAFID Second they could make a group in order to obtain a more complex detection technique combining two or more simpler techniques Press key ...
  15. Other type of agents are the response agents, which are not present in AAFID Press key ...
  16. They deal with the detected intrusions As for the detection agents, our proposal is to have a population of agents that implement several response policies Press key ...
  17. Another new type of agents is the evidence-search agent Press key ...
  18. The evidence-search agents collect evidences regarding an intrusion to use in a court Of course, to collect these evidences it is necessary to know what kind of evidences are valid and in what manner the agent needs to obtain these evidences Here there are two problems First, legal problems such as The privacy of the obtained data, and the different legislations in different countries The second problem is the conflict with response agents When a detection agent finds an intrusion, evidence-search agents try to collect more and more evidences related this intrusion But at the same time, response agents tries to cut the intrusion, which implies that perhaps the evidence-search agents don’t get a sufficient amount of evidence This problem is a typical one in which the collaboration of the two types of agents is needed Press key ...
  19. Also we propose the use of interface agents Press key ...
  20. In AAFID there is an user interface, but in our proposal there are several agents that act as the interface between the system and the users Here we must understood users as humans or as other systems For example, a user could be a more complex system in which our intrusion detection system should be integrated in order to manage it So the interface agents act as representants of users, and the system sees the users as agents Thus the interface agents could integrate learning algorithms to learn from the users in order to anticipate their needs, and even to incorporate new knowledge from the users in the system Press key ...
  21. Finally we have special agents Press key ...
  22. Which perform several tasks like The maintenance of the system Or provide several services to other agents Press key ...
  23. As conclusions we can say that intrusion detection is a challenge research field that attracts more and more attention from the security community Press key ... We have seen AAFID, the first intrusion detection system that employes agents Its main drawback is the rigidity of its architecture, due mainly to the rigid communication flow Press key ... In order to solve this problem, we have presented here the design lines of a new architecture based on AAFID which incorporates seven classes of agents These agents are highly autonomous and they collaborate among them in a dynamical manner using both domain knowledge and social knowledge Press key ... At present we are working in the implementation of the detection agents Press key ...
  24. And that’s all Thank you very much The End