Advertisement

A Policy Propagation Model Using Mobile Agents in Large-Scale Distributed Network Environments

  • Tae-Kyung Kim
  • Dong-Young Lee
  • Ok-Hwan Byeon
  • T. M. Chung
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2910)

Abstract

With the growing number of attacks on network infrastructures, we need better techniques to detect and prevent these attacks. Each security system in the distributed network requires different security rules to protect from these attacks efficiently. So the propagation of security rules is needed. Therefore, we introduce mobile agents that propagate security rules by constantly moving around the Internet as a solution to propagation of security rules. This paper describes a new approach for propagation of security rules in large-scale networks, in which mobile agent mechanisms are used. To evaluate the proposed approach, we simulated a policy propagation model using a NS-2 (Network Simulator). Our new approach presents advantages in terms of spreading rules rapidly and increasing scalability.

Keywords

Intrusion Detection Mobile Agent Autonomous Agent Intrusion Detection System Policy Conflict 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Lee, D.-Y., Kim, D.-S., Kim, T.-K., Chung, T.M.: Centralized Approach for Managing Heterogeneous Firewalls in Distributed Network Environments. In: WISA2002 (August 2002)Google Scholar
  2. 2.
    Qi, L., Yu, L.: Mobile agent-based security model for distributed system. In: Systems, Man, and Cybernetics, 2001 IEEE International Conference (2001)Google Scholar
  3. 3.
    Moffett, J., Sloman, M.S.: Policy Conflict Analysis in Distributed System Management. Journal of Organizational Computing 4(l), 1–22 (1994)CrossRefGoogle Scholar
  4. 4.
    Lupu, E.C., Sloman, M.: Conflicts in Policy-Based Distributed Systems Management. Journal of IEEE Transaction on Software Engineering 25(6), 852–869 (1999)CrossRefGoogle Scholar
  5. 5.
    Lupu, E., Sloman, M.: Conflict Analysis for Management Policies. In: International Symposium on Integrated Network Management IM 1997, pp. 430–143 (1997)Google Scholar
  6. 6.
    Lindqvist, U., Porras, P.A.: Detecting computer and network misuse through the Production-Based Expert System Toolset (PBEST). In: Proceedings of the 1999 Symposium on Security and Privacy, Oakland, California (May 1999)Google Scholar
  7. 7.
    Nwana, H.S.: Software Agents: an Overview. Knowledge Engineering Review (1996)Google Scholar
  8. 8.
    Crosbie, M., Spafford, G.H.: Defending a Computer System using Autonomous Agents. Technical Report No. 95-022, Dept. of Comp. Sciences, Purdue University (March 1996)Google Scholar
  9. 9.
    Crosbie, M., Spafford, E.H.: Active Defense of a Computer System using Autonomous Agents. Technical Report CSD-TR-95-008, Department of Computer Sciences, Purdue University (1995)Google Scholar
  10. 10.
    Balasubramaniyan, J., Garcia-Fernandez, J.O., Spafford, E.H., Zamboni, D.: An Architecture for Intrusion Detection using Autonomous Agents. Department of Computer Sciences, Purdue University, Coast TR 98-05 (1998) Google Scholar
  11. 11.
    Helmer, G.G., Wong, J.S.K., Honavar, V., Miller, L.: Intelligent agents for intrusion detection. In: Proceedings, IEEE Information Technology Conference, Syracuse, NY, September 1998, pp. 121–124 (1998)Google Scholar
  12. 12.
    Porras, A., Neumann, P.G.: EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In: Proceedings of the National Information Systems Security Conference (October 1997)Google Scholar
  13. 13.
    Porras, A., Valdes, A.: Live Traffic Analysis of TCP/IP Gateways. In: Networks and Distributed Systems Security Symposium (March 1998)Google Scholar
  14. 14.
    Jai, B., Garcia-Fernandez, J.O., Spafford, E.H., Zamboni, D.: An Architecture for Intrusion Detection using Autonomous Agents. Department of Computer Sciences, Purdue University, Coast TR 98-05 (1998)Google Scholar
  15. 15.
    Boudaoud, K., Labiod, H., Boutaba, R., Guessoum, Z.: Network security management with intelligent agents. In: Network Operations and Management Symposium. NOMS 2000 (2000)Google Scholar
  16. 16.
    Greenberg, S., Byington, C., Holding, T., Harper, G.: Mobile Agents and Security. In: IEEE Communications Magazine (July 1998)Google Scholar
  17. 17.
    NS network simulator, http://www-mash.cs.berkeley.edu/ns
  18. 18.
    Peterson, L., Davie, B.: Computer Networks: A Systems Approach, 2nd edn. Morgan Kaufmann, San Francisco (2000)Google Scholar
  19. 19.
    Jansen, W., Mell, P., Karygiannis, T., Marks, D.: Applying Mobile Agents to Intrusion Detection and Response (October 1999)Google Scholar
  20. 20.
    Kim, K.H., Kim, T.-K., Kim, D.S., Chung, T.M.: The Design of XML-based Internet Security Integrated System Architecture. In: International Conference on Computational Science 2003 (ICCS 2003) (June 2003)Google Scholar
  21. 21.
    NSF CISE Grand Challenge in e-Science Workshop Report, January 24 (2002), http://www.evl.uic.edu/activity/NSF/index.html
  22. 22.
    Mukherjee, B., Heberlein, T.L., Levitt, K.N.: Network Intrusion Detection. IEEE Network (May/June 1994)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Tae-Kyung Kim
    • 1
  • Dong-Young Lee
    • 1
  • Ok-Hwan Byeon
    • 2
  • T. M. Chung
    • 1
  1. 1.Internet Management Technology Laboratory1, School of Information and Communication EngineeringSungkyunkwan UniversityKyunggi-doRepublic of Korea
  2. 2.Korea Institute of Science and Technology Information 

Personalised recommendations