• 제목/요약/키워드: network agents

검색결과 481건 처리시간 0.027초

IPv6 Address Management System Based on IP Agents (IP Agent 기반 IPv6 주소 관리 시스템)

  • Lee, Dong-Il;Hong, Yoon Hwan;Kim, Myung-Kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국정보통신학회 2013년도 추계학술대회
    • /
    • pp.1051-1054
    • /
    • 2013
  • Because of the limitations of traditional IPv4 address, the adoption of IPv6 has been accelerated. In IPv6 system, each host can obtain the IP address automatically using auto-configuration functionality, which is one of the features of IPv6. However, the auto-configuration functionality can allow a malicious user to get its IPv6 address and access the network without permission, the IP address management functionality becomes more important than IPv4. In this paper, we propose an IPv6 address management system based on IP agents, which protects the unauthorised users from accessing the network and redirects the web access of those users to a specific web page to induce them to access the network after installing the IP agents.

  • PDF

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques

  • El-Semary, Aly M.;Mostafa, Mostafa Gadal-Haqq M.
    • Journal of Information Processing Systems
    • /
    • 제6권4호
    • /
    • pp.481-500
    • /
    • 2010
  • The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools is an Intrusion detection system which can be classified based on detection approachs as being signature-based or anomaly-based. Even though intrusion detection systems are well defined, their cooperation with each other to detect attacks needs to be addressed. Consequently, a new architecture that allows them to cooperate in detecting attacks is proposed. The architecture uses Software Agents to provide scalability and distributability. It works in two modes: learning and detection. During learning mode, it generates a profile for each individual system using a fuzzy data mining algorithm. During detection mode, each system uses the FuzzyJess to match network traffic against its profile. The architecture was tested against a standard data set produced by MIT's Lincoln Laboratory and the primary results show its efficiency and capability to detect attacks. Finally, two new methods, the memory-window and memoryless-window, were developed for extracting useful parameters from raw packets. The parameters are used as detection metrics.

Distributed Information Extraction in Wireless Sensor Networks using Multiple Software Agents with Dynamic Itineraries

  • Gupta, Govind P.;Misra, Manoj;Garg, Kumkum
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권1호
    • /
    • pp.123-144
    • /
    • 2014
  • Wireless sensor networks are generally deployed for specific applications to accomplish certain objectives over a period of time. To fulfill these objectives, it is crucial that the sensor network continues to function for a long time, even if some of its nodes become faulty. Energy efficiency and fault tolerance are undoubtedly the most crucial requirements for the design of an information extraction protocol for any sensor network application. However, most existing software agent based information extraction protocols are incapable of satisfying these requirements because of static agent itineraries and large agent sizes. This paper proposes an Information Extraction protocol based on Multiple software Agents with Dynamic Itineraries (IEMADI), where multiple software agents are dispatched in parallel to perform tasks based on the query assigned to them. IEMADI decides the itinerary for an agent dynamically at each hop using local information. Through mathematical analysis and simulation, we compare the performance of IEMADI with a well known static itinerary based protocol with respect to energy consumption and response time. The results show that IEMADI provides better performance than the static itinerary based protocols.

An Autonomous Optimal Coordination Scheme in a Protection System of a Power Distribution Network by using a Multi-Agent Concept

  • Hyun, Seung-Ho;Min, Byung-Woon;Jung, Kwang-Ho;Lee, Seung-Jae;Park, Myeon-Song;Kang, Sang-Hee
    • KIEE International Transactions on Power Engineering
    • /
    • 제2A권3호
    • /
    • pp.89-94
    • /
    • 2002
  • In this paper, a protection system using a Multi-Agent concept for power distribution networks is proposed. Every digital over current relay(OCR) is developed as an agent by adding its own intelligence, self-tuning and communication ability. The main advantage of the Multi-Agent concept is that a group of agents work together to achieve a global goal which is beyond the ability of each individual agent. In order to cope with frequent changes in the network operation condition and faults, an OCR agent, suggested in this paper, is able to detect a fault or a change in the network and find its optimal parameters for protection in an autonomous manner considering information of the whole network obtained by communication between other agents. Through this kind of coordination and information exchanges, not only a local but also a global protective scheme is completed. Simulations in a simple distribution network show the effectiveness of the suggested protection system.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • 제12권4호
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 한국산학기술학회 2003년도 Proceeding
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

Dynamically Adaptable Mobile Agents for Scaleable Software and Service Management

  • Brandt, Raimund;Hortnag, Chistian;Reiser, Helmut
    • Journal of Communications and Networks
    • /
    • 제3권4호
    • /
    • pp.307-316
    • /
    • 2001
  • Two hard sub-problems have emerged relating to the use of mobile agents for service management tasks. First, what is their impact on security, and second, how can they receive a flexible capacity to adapt to an open range of different environments on demand, without introducing trio stringent prior assumptions. In this paper, we present work towards solving the second problem, which is of particular interest to management software, because it typically needs to excert fine-grained and therefore particular resource control. We suggest a mechanism that reassembles mobile agents from smaller sub-components during arrival at each hop. The process incorporates patterns of unmutable and mutable sub-components, and is informed by the conditions of each local environment. We discuss different kinds of software adaptation and draw a distinction between static and continuous forms. Our software prototype for dynamic adaptation provides a concept far exchanging environment-dependent implementations of mobile agents during runtime. Dynamic adaptation enhances efficiency of mobile code in terms of bandwidth usage and scalability.

  • PDF

A Construction Agent-based Design Environment using a Network (네트워크를 이용한 에이젼트 기반 설계 환경 구축)

  • 안상준;이수홍
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 한국정밀공학회 1995년도 추계학술대회 논문집
    • /
    • pp.697-701
    • /
    • 1995
  • The network encironment includes a number of autonomous agents which are widely distributed, have different platforms, and change very dynamically. The information system operated on this environment must solve some basic problems; restrictive client-server models, heterogeneous systems, and intellignet agents. We are using KQML for knowledge management. Java language provides solutions against a strong server dependency and a heterogenous troubles. We introduce KQML as an agent communication language and JATLite as a java agent template. these increase an efficiency of communication on network and enable us to use resources distributed in world wide web. Also, we describe a new agent system architecture and implement it through an example scenario

  • PDF

Implementation of Distributed Computing Environment using Java Agent (자바 에이젼트를 이용한 분산컴퓨팅 환경 구현)

  • 서건원;이길흥
    • Journal of the Korea Computer Industry Society
    • /
    • 제3권2호
    • /
    • pp.199-208
    • /
    • 2002
  • Because of the change of computing environment, an agent technology is spotlighted recently. By deploying agent distributedly in network and offering the necessary service quickly in place easing realization of service, the enlargement of the effectiveness of network is necessary more and more. In this paper, agents programmed in java are distributed in place easing realization of service in network. And a manager connects to agents and informs URL of service code of the agent. This paper implements distributed computing environment in which agent downloads service code from URL of service code, executes the code, and returns the result of execution to manager.

  • PDF

Multi Agent System (MAS) Framework for Home Network Application (홈 네트워크 응용을 위한 Multi Agent System (MAS) 프레임워크)

  • Jang, In-Hun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • 제17권1호
    • /
    • pp.80-85
    • /
    • 2007
  • As home network system begins serving in earnest, the recent fruits of research in home service robot show that the new epoch that human and intelligent robots are living, communicating and interacting together at home, may come true in the near future. In the other hand, it is generally known that the multiagent system, performing distributed process together with other different devices in a home network system, is better than single robot or single home server for adapting themselves to home environment and completing their mission because the characteristic of home environment is 'open'. Therefore, in this paper we suggest the framework model to define agents, which is needed lot the home with a home network system, and the communication protocol architecture between agents. For this, we focus our attention on an agent comprising the set of many agent instances rather than the single intelligent or ability of a robot or home server, and also suggest the way of adaptation for agent systems to their environments and interaction with human in the manner of cooperation and negotiation among agents or agent instances in each agent.