Skip to main content

Intelligent Network-Based Early Warning Systems

  • Conference paper
Critical Information Infrastructures Security (CRITIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4347))

Abstract

In this paper we present an approach for an agent-based early warning system (A-EWS) for critical infrastructures. In our approach we combine existing security infrastructures, e.g. firewalls or intrusion detection systems, with new detection approaches to create a global view and to determine the current threat state.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albayrak, S., Müller, A., Scheel, C., Milosevic, D.: Combining Self-Organizing Map Algorithms for Robust and Scalable Intrusion Detection. In: Mohammadian, M. (ed.) Proceedings of International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005 Book 2), Vienna, Austria, pp. 123–130 (2005)

    Google Scholar 

  2. Bundesamt für Sicherheit in der Informationstechnik. Critical infrastructures in state and society (2006-05-16), http://www.bsi.de/fachthem/kritis/kritis_e.htm

  3. Bundesamt für Sicherheit in der Informationstechnik. Certification Report BSI-DSZ-CC-0248-2005 for Java Intelligent Agent Componentware IV Version 4.3.11 from DAI- Labor Technische Universität Berlin (2005), http://www.bsi.de/zertifiz/zert/reporte/0248a.pdf

  4. DAI-Labor. Security Target Java Intelligent Agent Componentware IV (2004), http://www.bsi.de/zertifiz/zert/reporte/0248b.pdf

  5. Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T., Mead, N.R.: Survivable Network Systems: An Emerging Discipline. Technical Report CMU/SEI-97-TR-013 ESC-97-013, Software Engineering Institute, Carnegie Mellon University, Pittsburg, PA 15213 USA (November 1997)

    Google Scholar 

  6. Fricke, S., Bsufka, K., Keiser, J., Schmidt, T., Sesseler, R., Albayrak, S.: Agent-based telematic services and telecom applications. Communications of the ACM 44(4), 43–48 (2001)

    Article  Google Scholar 

  7. Geissler, T., Kroll-Peters, O.: Applying Security Standards to Multi Agent Systems. In: The First International Workshop on Safety and Security in Multiagent Systems (SASEMAS) Part of AAMAS held at Columbia University New York City, July 20 (2004)

    Google Scholar 

  8. Hoepers, C., Steding-Jessen, K., Cordeiro, L.E.R., Chaves, M.H.P.C.: A National Early Warning Capability Based on a Network of Distributed Honeypots. In: Proceedings of the 17th Annual FIRST Conference on Computer Security Incident Handling, Singapore (June 2005)

    Google Scholar 

  9. Knight, J.C., Elder, M.C., Flinn, J., Marx, P.: Analysis of Four Critical Infrastructure Applications. Technical Report Computer Science Report No. CS-97-27, Department of Computer Science, University of Virginia (September 1998)

    Google Scholar 

  10. Kotenko, I.: Active vulnerability assessment of computer networks by simulation of complex remote attacks. In: ICCNMC 2003: International Conference on Computer Networks and Mobile Computing, 2003, October 2003, pp. 40–47 (2003)

    Google Scholar 

  11. Merola, A.: Intrusion Detection Systems-Interna. Hakin9 (4) (2005), http://www.hakin9.org

  12. Zou, C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for internet worms. In: Proceedings of the 10th ACM conference on Computer and communication security, pp. 190–199. ACM Press, New York (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bsufka, K., Kroll-Peters, O., Albayrak, S. (2006). Intelligent Network-Based Early Warning Systems. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_9

Download citation

  • DOI: https://doi.org/10.1007/11962977_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69083-2

  • Online ISBN: 978-3-540-69084-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics