Dynamic Distributed Information Security System Based on Multi-Agent


Article Preview

With the growing population of using public network, network intrusion events happened more frequently. Aim to the drawbacks of traditional information security methods, the multi-agent system model was proved to be very promising. This paper proposes a dynamic distributed information security system based on multi-agent that dynamically integrates all distributed information security facilities to achieve efficiently collaborative information security. In order to validate this proposed approach, the authors give the material experiment test in the end of this paper. The final experiment result suggests that, this proposed approach is feasible, correct and valid.



Key Engineering Materials (Volumes 460-461)

Edited by:

Yanwen Wu




P. Wang, "Dynamic Distributed Information Security System Based on Multi-Agent", Key Engineering Materials, Vols. 460-461, pp. 433-438, 2011

Online since:

January 2011





[1] R.S. Coles, R. Moulton. Operationalizing IT risk management. Computers & Security. Vol. 22, no. 6 (2003) pp.487-493.

DOI: https://doi.org/10.1016/s0167-4048(03)00606-0

[2] M. Gerber, R.V. Solms. From risk analysis to security requirements. Computers & Security. Vol. 20, no. 7 (2001) pp.577-584.

DOI: https://doi.org/10.1016/s0167-4048(01)00706-4

[3] D.E. Denning. An Intrusion-Detection Model. IEEE Transactions on Software Engineering. Vol. 13, no. 2 (1987) pp.222-232.

[4] B. Solms, R. Solms. Incremental information security certification. Computers & Security. Vol. 20, no. 4, (2001) pp.308-310.

DOI: https://doi.org/10.1016/s0167-4048(01)00405-9

[5] R.C. Reid, S.A. Floyd. Extending the risk analysis model to include market-insurance. Computers & Security. Vol. 20, no. 4 (2001) pp.331-339.

DOI: https://doi.org/10.1016/s0167-4048(01)00411-4

[6] G.G. Helmer, S.K. Johnny, H. Vasant, et al. Intelligent Agents for Intrusion Detection. In: Proceeding of the IEEE Information Technology Conference. New York: IEEE Computer Society Press. (1998) pp.121-124.

[7] H.S. Eugene, Z. Diego. Intrusion Detection Using Autonomous Agents. Computer Networks. Vol. 34, no. 2 (2000) pp.547-570.

DOI: https://doi.org/10.1016/s1389-1286(00)00136-5

[8] M. Asaka, O. Takefumi, I. Tadashi, et al. Remote Attack Detection Method in IDA: MLSI-Based Intrusion Detection using Discriminant Analysis. In: Proceedings of 2002 Symposium on Applications and the Internet. New York: IEEE Computer Society Press. (2002).

DOI: https://doi.org/10.1109/saint.2002.994451