Multi-agent Platform for Security Level Evaluation of Information and Communication Services

  • Grzegorz KołaczekEmail author
Conference paper
Part of the Studies in Computational Intelligence book series (SCI, volume 457)


The paper presents an original multi-agent approach to security level evaluation in service oriented systems for telecommunication sector, especially for providers of communication and information services. The platform is built from the following elements: user interface which has been used to select and configure the mode of operation of the analytical algorithms implemented within the platform; inter-modules interfaces which are used to supply the algorithms with appropriate datasets and to provide the user the results of analysis; analytical services which are responsible for security level evaluation and finally data repositories. The platform provides the security evaluation functionality as a web service according to Security as a Service (SaaS) model. This way of providing security assumes that the analytical methods are implemented independently from the evaluated objects and can be provided to any requesting subject as web services. The paper presents the architecture of the platform and the provided functionalities. Finally, the example scenario of the security level evaluation has been demonstrated and discussed. The presented platform for security level evaluation is an integral part of the comprehensive solution called PlaTel which has been designed for management and execution of information and communication services.


Business Process Application Programming Interface Service Composition Anomaly Detection Service Orient Architecture 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Magedanz, T., Blum, N., Dutkowski, S.: Evaluation of SOA concepts in telecommunications, Berlin (2007)Google Scholar
  2. 2.
    Harris, T.: SOA in Telecom (2010)Google Scholar
  3. 3.
    Strategies for enabling new serwices,
  4. 4.
    FP7 Call 1 achievements in software and services (2011)Google Scholar
  5. 5.
    Bond, G., Cheung, E., Fikouras, I., Levenhsteyn, R.: Unified telecom and web services composition: problem definition and future directions. In: IPTCOM 2009 (2009)Google Scholar
  6. 6.
    Chandola, V., Benerjee, A., Kumar, V.: Anomaly Detection, A Survey (2007)Google Scholar
  7. 7.
    Kołaczek, G.: Multiagent Security Evaluation Framework for Service Oriented Architecture Systems. In: Velásquez, J.D., Ríos, S.A., Howlett, R.J., Jain, L.C. (eds.) KES 2009, Part I. LNCS (LNAI), vol. 5711, pp. 30–37. Springer, Heidelberg (2009)Google Scholar
  8. 8.
    Burgess, M.: An Approach to Understanding Policy Based on Autonomy and Voluntary Cooperation. In: Schönwälder, J., Serrat, J. (eds.) DSOM 2005. LNCS, vol. 3775, pp. 97–108. Springer, Heidelberg (2005)Google Scholar
  9. 9.
    Burgess, M.: Two Dimensional Time-Series for Anomaly Detection and Regulation in Adaptive Systems. In: Feridun, M., Kropf, P., Babin, G. (eds.) DSOM 2002. LNCS, vol. 2506, pp. 169–180. Springer, Heidelberg (2002)Google Scholar
  10. 10.
    Gorodetski, V.I., Karsayev, O., Khabalov, A., Kotenko, I., Popyack, L.J., Skormin, V.: Agent-Based Model of Computer Network Security System: A Case Study. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 39–50. Springer, Heidelberg (2001)Google Scholar
  11. 11.
    Hwang, K., Liu, H., Chen, Y.: Cooperative Anomaly and Intrusion Detection for Alert Correlation in Networked Computing Systems, Technical Report, USC Internet and Grid Computing Lab, TR 2004-16 (2004)Google Scholar
  12. 12.
    Lakhina, A., Crovella, M., Diot, C.: Characterization of Network-Wide Anomalies in Traffic Flows. Technical Report BUCS-2004-020, Boston University (2004),
  13. 13.
    Ammeller, D., Franch, X.: Service level agreement monitor (SALMon). In: 2008 7th International Conference on Composition-Based Software Systems, pp. 224–227 (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Institute of Informatics, Faculty of Computer Science and ManagementWroclaw University of TechnologyWrocławPoland

Personalised recommendations