Advertisement

Modelling Distributed Network Security in a Petri Net- and Agent-Based Approach

  • Simon Adameit
  • Tobias Betz
  • Lawrence Cabac
  • Florian Hars
  • Marcin Hewelt
  • Michael Köhler-Bußmeier
  • Daniel Moldt
  • Dimitri Popov
  • José Quenum
  • Axel Theilmann
  • Thomas Wagner
  • Timo Warns
  • Lars Wüstenberg
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6251)

Abstract

Distributed network security is an important concern in modern business environments. Access to critical information and areas has to be limited to authorised users. The Herold research project aims to provide a novel way of managing distributed network security through the means of agent-based software. In this paper we present the first models, both conceptual and technical that have been produced in this project. Furthermore we examine the Paose development approach used within the project and how it contributes to Herold.

Keywords

Distributed network security Software agents Petri nets Agent-oriented methodologies 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bieszczad, A., Pagurek, B., White, T.: Mobile Agents for Network Management. IEEE Communications Surveys 1(1), 2–9 (1998)CrossRefzbMATHGoogle Scholar
  2. 2.
    Bradshaw, J.M., Dutfield, S., Benoit, P., Woolley, J.D.: KAoS: toward an industrial-strength open agent architecture. In: Software Agents, pp. 375–418. MIT Press, Cambridge (1997)Google Scholar
  3. 3.
    Cabac, L., Dörges, T., Duvigneau, M., Reese, C., Wester-Ebbinghaus, M.: Application Development with Mulan. In: Proceedings of the International Workshop on Petri Nets and Software Engineering (PNSE’07), pp. 145–159 (2007)Google Scholar
  4. 4.
    Cabac, L.: Multi-Agent System: A Guiding Metaphor for the Organization of Software Development Projects. In: Petta, P., Müller, J.P., Klusch, M., Georgeff, M. (eds.) MATES 2007. LNCS (LNAI), vol. 4687, pp. 1–12. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  5. 5.
    Du, T.C., Li, E.Y., Chang, A.-P.: Mobile Agents in Distributed Network Management. Communications of the ACM 46(7), 127–132 (2003)CrossRefGoogle Scholar
  6. 6.
    Duvigneau, M.: Bereitstellung einer Agentenplattform für petrinetzbasierte Agenten. Diploma thesis, University of Hamburg (2002)Google Scholar
  7. 7.
    Goldszmidt, G., Yemini, Y.: Delegated Agents for Network Management. IEEE Communications Magazine 36(3), 66–71 (1998)CrossRefGoogle Scholar
  8. 8.
    Großklaus, A.: Policybasierte Konfiguration von verteilten Netzwerksicherheitskomponenten. Diploma thesis, University of Hamburg (2007)Google Scholar
  9. 9.
    Kummer, O.: Referenznetze. Logos Verlag, Berlin (2002)Google Scholar
  10. 10.
    Puliafito, A., Tomarchio, O.: Using Mobile Agents to Implement Flexible Network Management Strategies. Computer Communications 23(8), 708–719 (2000)CrossRefGoogle Scholar
  11. 11.
    Rölke, H.: Modellierung von Agenten und Multiagentensystemen – Grundlagen und Anwendungen. Logos Verlag, Berlin (2004)Google Scholar
  12. 12.
    Twidle, K., Lupu, E., Dulay, N., Sloman, M.: Ponder2 – A Policy Environment for Autonomous Pervasive Systems. In: Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks (POLICY ’08), pp. 245–246. IEEE Computer Society Press, Los Alamitos (2008)CrossRefGoogle Scholar
  13. 13.
    Uszok, A., Bradshaw, J., Jeffers, R., Suri, N., Hayes, P., Breedy, M., Bunch, L., Johnson, M., Kulkarni, S., Lott, J.: KAoS Policy and Domain Services: Toward a Description-Logic Approach to Policy Representation, Deconfliction, and Enforcement. In: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 93–98. IEEE, Los Alamitos (2003)Google Scholar
  14. 14.
    Valk, R.: On Processes of Object Petri Nets. Technical Report FBI-HH-B-185/96, University of Hamburg, Department of Computer Science (1996)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Simon Adameit
    • 2
  • Tobias Betz
    • 2
  • Lawrence Cabac
    • 2
  • Florian Hars
    • 1
  • Marcin Hewelt
    • 2
  • Michael Köhler-Bußmeier
    • 2
  • Daniel Moldt
    • 2
  • Dimitri Popov
    • 2
  • José Quenum
    • 2
  • Axel Theilmann
    • 1
  • Thomas Wagner
    • 2
  • Timo Warns
    • 1
  • Lars Wüstenberg
    • 2
  1. 1.PRESENSE Technologies GmbH, HamburgGermany
  2. 2.Faculty of Mathematics, Informatics and Natural Sciences, Department of InformaticsUniversity of HamburgGermany

Personalised recommendations