• Title/Summary/Keyword: Agent Network

Search Result 980, Processing Time 0.028 seconds

Proposed of Intrusion detection model using the Mobile agent (이동에이전트를 이용한 침입탐지 모델의 제안)

  • 황인선;박경우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.55-62
    • /
    • 2004
  • The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion detection system has been an active research area to reduce the risk from intruders. A number of advantages of using mobile agent computing paradigms have been Proposed. These advantages include : overcoming network latency, reducing network load, executing asynchronously and autonomously, adapting dynamically, and operating in heterogeneous environments. Many information security models have been proposed to mitigate agent-to-agent. agent-to-platform, and platform-to-agent element risks . In these paper, We have an object which is that through intrusion detection system development, the mobile agent is managed and through the analysis of performance data. the best environment is served.

  • PDF

Scalability of a Mobile Agents based Network Management Application

  • Rubinstein, M.G.;Duarte, O.C.M.B.;Pujolle, Guy
    • Journal of Communications and Networks
    • /
    • v.5 no.3
    • /
    • pp.240-248
    • /
    • 2003
  • This paper analyzes mobile agent performance in network management compared to the client-server model used in the Simple Network Management Protocol (SNMP). Prototypes of an application that gathers MIB-II (Management Information Base-II) variables have been created and tested on a LAN. After acquiring implementation parameters related to network management and to the mobile agent infrastructure, simulation results have been obtained on large topologies similar in shape to the Internet. Response time results show that mobile agents perform better than SNMP when the number of managed elements ranges between two specific limits, an inferior bound and a superior one, determined by the number of messages that pass through a backbone and by the mobile agent size which grows along with MIB-II variables collected on network elements. The results also show that a significant improvement is achieved when the mobile agent returns or sends data to the management station after visiting a fixed number of nodes.

Backward Migration of an Active Rule Mobile Agent on the Sensor Network (센서네트워크상에서 능동규칙 이동에이전트의 역 방향 이주)

  • Lee, Yonsik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.488-494
    • /
    • 2013
  • For the activeness and autonomy of a sensor network, the efficient migration method of a mobile agent and the consistent naming services are the required components of a sensor network. Accordingly, this paper presented the implementation of backward migration of an active rule mobile agent applying the naming method based on RMI that used the meta_table including the informations about the components of a sensor network. This study implemented based on the extension of the forward migration[12], and the results of the various experiments present the efficacy of mobile agent middleware system and the possibility of constructing efficient sensor network application environment. And, the results of this study are able to enhance the adaptability on dynamic changes of environment in sensor network application development.

A Design and Implementation of Home Network Access Agent and its Testbed (홈 네트워크 액세스 에이전트 및 테스트베드 설계 구현)

  • Kim, Dong-Kyun;Lee, Myoung-Kun;Jeon, Byung-Chan;Lee, Sang-Jeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.167-176
    • /
    • 2006
  • In this paper, a home network access agent, which controls and monitors networked appliances at home using various terminals regardless of user's location, is designed and implemented. The proposed access agent integrates wire and wireless network on a home gateway (or home server) and is accessed with consistent messages using various terminals such as a web terminal, a PDA and a cellular phone. Also, in order to verify the operation and availability of the agent, a user interface for the various terminals is designed and a home network testbed which is accessed and controlled by the terminals is implemented.

  • PDF

Analytical Models and Performance Evaluations of SNMP and Mobile Agent (SNMP와 이동에이전트의 해석적 모델 및 성능 평가)

  • 이정우;윤완오;신광식;최상방
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8B
    • /
    • pp.716-729
    • /
    • 2003
  • As the public Internet and private internet have grown from small networks into large infrastructures, the need to more systematically manage the large number of network components within these networks has grown more important as well. The rapid growth of network size has brought into question the salability of the existing centralized model, such as SNMP(Simple Network Management Protocol) and CMIP(Common Management Information Protocol). Thus, for efficient network management, researches about mobile agent have also been performed recently. This paper presents analytical models of centralized approach based on SNMP protocol, distributed approach based on mobile agent, and mixed mode to make up for shortcomings of SNMP and mobile agent. We compare the performance of these analytical models based on network management response time. Experiment results show that performance of mobile agent and the nixed mode is less sensitive to the delay in WAN network environment. However, SNMP is more efficient for the simple network environment like LAN. We also propose an adaptive network management algorithm in consideration of network t environment. delay, task, and the number of nodes based on the results of analytical models. The results show that the adaptive network management algorithm can reduce the network management response time by 10% compared with either mobile agent or mixed mode network management algorithm.

A Study on the Development of an Agent Communication Module for a Multi-Agent Based Power Distribution Network Protection System Using DNP 3.0 Protocols (DNP3.0 프로토콜을 이용한 배전계통 멀티 에이전트 보호시스템의 통신 모듈 개발에 관한 연구)

  • 최면송;이한웅;민병운;정광호;이승재;현승호
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.9
    • /
    • pp.506-512
    • /
    • 2003
  • In this paper, a communication module between Relay agents in a multi-agent system based power distribution network protection system is realized using DNP3.0(Distributed Network Protocol), which is the standard communication protocol of distribution automation system in KEPCO. The key words for agent communication in the multi-agent based protection system are defined and represented by use of DNP application function code. The communication module developed based on the proposed communication scheme is tested by use of the Communication Test Harness, a test tool for DNP protocol, then used to the multi-agent system based power distribution net work protection system.

Protecting Mobile Agent with VPN (VPN을 이용한 이동 에이전트의 보호)

  • 박재경;원유헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.3-12
    • /
    • 2001
  • In this course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies is private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is the use of mobile agents. The mobile agent is capable of migrating autonomously form node to node in the network, to perform some computations on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It does however, suffer. from a major drawback namely, the potential for malicious attacks, abuse of resources, pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describes the design of a secure mobile agent gateway 7hat can split and merge the agent code with security policy database on the VPN. This mechanism will promote security in the mobile agent systems.

XML-Based Network Management for IP Networks

  • Choi, Mi-Jung;Hong, James W.;Ju, Hong-Taek
    • ETRI Journal
    • /
    • v.25 no.6
    • /
    • pp.445-463
    • /
    • 2003
  • XML-based network management, which applies XML technologies to network management, has been proposed as an alternative to existing network management. The use of XML in network management offers many advantages. However, most existing network devices are already embedded with simple network management protocol (SNMP) agents and managed by SNMP managers. For integrated network management, we present the architectures of an XML-based manager, an XML-based agent, and an XML/SNMP gateway for legacy SNMP agents. We describe our experience of developing an XML-based network management system (XNMS), XML-based agent, and an XML/SNMP gateway. We also verify the effectiveness of our XML-based agent and XML/SNMP gateway through performance tests. Our experience with developing XNMS and XML-based agents can be used as a guideline for development of XML-based management systems that fully take advantage of the strengths of XML technologies.

  • PDF

Design and Implementation of Java Based Mobile Agent Security System (자바 기반의 이동 에이전트 보안 구조 설계와 암호기능 구현)

  • 최길환;배상현
    • Journal of Internet Computing and Services
    • /
    • v.3 no.1
    • /
    • pp.61-69
    • /
    • 2002
  • Big-bang growth of Internet and World Wide Web is supplying much information and resources to network. However, use of internet resources is receiving many limitations by bandwidth for most users. But, through Applet way, can solve degradation problem that follow on static side and bandwidth of CGI that HTML has. Mobile Agent starts in user's computer to accomplish user's specification purpose and achieves work rooving network. Because code that can perform so is transmitted, and is achieved in network through network, important problem happens to mobile code's security naturally. In computing environment that this research uses this Mobile Agent way that can protect host and agent groping report, describe problem that happen composing Mobile Agent relationship concept and Mobile Agent, and do so that may present method that is studying to solve these problem, and use method that application is possible actually among presented method and design transfer agent's security system.

  • PDF

Improvement of SNMP Performance using the Group Polling (그룹폴링을 이용한 SNMP 성능 개선)

  • 홍종준
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.4
    • /
    • pp.120-125
    • /
    • 2000
  • SNMP(Simple Network Management Protocol) could have the overhead of network, if the number of the agent system which is managed by the management system is increased by the polling for the collection of network management information and the reply traffic for it. In this Paper, the polling method used in SNMP is improved, and Group Polling method is proposed. This can reduce the overhead of network, on case that the agent system is to be increased. The proposed method collects information by grouping agent systems, and have smaller reply latency time and communication overhead than the previous method. So if the number of agent system or the Polling count is numerous, the proposed method is more efficient. As the result of the prototype test, the increasement of agent system can have small variation of traffic and transmission delay time.

  • PDF