Autonomous Agents-Based Security Infrastructure

  • Sophia Corsava
  • Vladimir Getov
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2668)


Organizations have evolved to the stage where critical data management and protection are intimately linked to revenues. Error margins become smaller as information importance becomes greater. Security compromises cause considerable credibility loss and frustration. In this paper, we address both proactively and retrospectively security related problems for Unix-based systems. We have designed and built a software infrastructure, which handles security issues by autonomous intelligent agents automatically and dynamically with none or minimal service interruptions. Our software has been implemented and used for more than a year as part of the production environment of a mobile phone operator and Internet provider. The evaluation results over this period have shown that autonomous intelligent agents handling security can reduce dramatically downtime caused by security related incidents.


Intrusion Detection Buffer Overflow Security Breach Intelligent Software Network File System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Barrett, D.J., Silverman, R.: SSH, The Secure Shell: The Definitive Guide, O’Reilly & Associates (2001)Google Scholar
  2. 2.
    Burgess, M.: Computer Immunology, Proceedings of 12th Systems Administration Conference (LISA’ 98),, Boston, USA (1998)
  3. 3.
    Corsava, S., Getov, V.: Self-Healing Intelligent Infrastructure for Computational Clusters, Proceedings of SHAMAN Workshop, ACM ISC, New York, USA (2002)Google Scholar
  4. 4.
    Corsava, S., Getov, V.: Intelligent Fault-Tolerant Architecture for Cluster Computing: A High Level Overview, Proceedings of PDCN03, IASTED, Innsbruck, Austria (2003)Google Scholar
  5. 5.
    Garfinkel, S., Spafford, G.: Practical Unix and Internet Security, O’Reilly & Associates (1996)Google Scholar
  6. 6.
    Helmer, G., Wong, J.S.K., Honavar, V., Miller, L.: Intelligent Agents for Intrusion Detection, Proceedings of IEEE Information Technology Conference, Syracuse, USA (1998) 121–124Google Scholar
  7. 7.
    Huber, M.J.: JAM: A BDI-theoretic Mobile Agent Architecture, Proceedings of the Third International Conference on Autonomous Agents (Agents’99), Seattle, USA (1999) 236–243Google Scholar
  8. 8.
    McClure, S., Scambray, J., Kurtz, G.: Hacking Exposed: Network Security Secrets and Solutions (3rd edition), Osborne McGraw-Hill (2001)Google Scholar
  9. 9.
    Pearl, J.: Reasoning with Cause and Effect, IJCAI Award Lecture (1999)Google Scholar
  10. 10.
    Quigley, E.: Unix Shells by Example, Prentice Hall (1999)Google Scholar
  11. 11.
    Stern, H., Eisler, M., Labiaga, R.: Managing NFS and NIS, O’Reilly & Associates (2001)Google Scholar
  12. 12.
    Sowa, J.F.: Knowledge Representation: Logical, Philosophical, and Computational Foundations, Brooks Cole Publishing (2000)Google Scholar
  13. 13.
    Weiss, G.: Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence, MIT Press (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Sophia Corsava
    • 1
  • Vladimir Getov
    • 1
  1. 1.Harrow School of Computer ScienceUniversity of WestminsterLondonU.K.

Personalised recommendations