J. Pikoulas
An intelligent agent security intrusion system
Pikoulas, J.; Buchanan, W.; Mannion, M.; Triantafyllopoulos, K.
Abstract
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing network, thus they must be protected at different levels of the OSI model. At the physical layer, they can be protected by lock-and-key, and at the data link, they can be protected within VLANS (virtual LANs). With the network and transport layers, networks can be secured by firewalls, which monitor source and destination network addresses, and source and destination ports, respectively. At the session level, user names and passwords are be used. Unfortunately, all these methods can be prone to methods which can overcome the protection used. This paper expands the research previously undertaken on a misuse system based on the intelligent agent software technology. The system monitors user actions in real-time and take appropriate actions if necessary. Along with this our system uses a short-term prediction to predict the user behaviour and advises the system administrator accordingly, before the actual actions take place. This paper presents new results, which are based on an increased number of users. We tested our short-term prediction model, introduced the notion of intervention to our model, and found that the results are very close to the actual user behaviour
Citation
Pikoulas, J., Buchanan, W., Mannion, M., & Triantafyllopoulos, K. (2002, April). An intelligent agent security intrusion system. Presented at Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, Lund, Sweden
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems |
Start Date | Apr 8, 2002 |
End Date | Apr 11, 2002 |
Online Publication Date | Aug 7, 2002 |
Publication Date | 2002 |
Deposit Date | Dec 22, 2010 |
Publicly Available Date | Dec 22, 2010 |
Publisher | Institute of Electrical and Electronics Engineers |
Peer Reviewed | Peer Reviewed |
Pages | 94-99 |
Book Title | Proceedings Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems |
ISBN | 0769515495 |
DOI | https://doi.org/10.1109/ecbs.2002.999827 |
Keywords | Network security; Virtual LAns; firewalls; user validation; intelligent agent software technology; user behaviour; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/3992 |
Publisher URL | http://dx.doi.org/10.1109/ECBS.2002.999827 |
Contract Date | Dec 22, 2010 |
Files
10.1.1.96.840.pdf
(291 Kb)
PDF
Copyright Statement
(c) 2002 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works
You might also like
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology
(2024)
Journal Article
Detection of Ransomware
(2024)
Patent
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search