Automatic Intrusion Detection and Secret Multi Agent Preservation Using Authentication Measurement Network Threat

Automatic Intrusion Detection and Secret Multi Agent Preservation Using Authentication Measurement Network Threat

Ghossoon M. Waleed Al-Saadoon
DOI: 10.4018/978-1-4666-6583-5.ch003
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The computer sciences and their applications are developing continuously. This growth should be protected. One of the methods to fulfill this approach by using the encryption method ‘Rijndael Advanced Encryption Standard' is applied for security information DBs, to prevent an unauthorized user from accessing any stored information. The security method determines the resources that agents are able to have an access and to give permission to other agents. Security and security assurance are special integrity in agent system to enable it to cooperate or to complete the application and where agent system may not be trustful to visiting agents. Ideas of this chapter of using multi agent framework is to design the proposed Automatic Intrusion Detection model and to secret multi agent preservation using authentication measurement network threat. This approach uses statistical models to correlate and analyse data in the network. It takes the decisions to control both local and global agent's data bases perceptively. Also it adopts the security problem authentication and authorization by providing a secure distributed agent system.
Chapter Preview
Top

Introduction

Over the years computer systems have successfully evolved from centralized monolithic computing devices supporting static application to distributed computing by Networks, therefore in this chapter the systems are becoming more opened and subjected to set of security threats. Thus, a key challenge is to provide all computer systems with the appropriate mechanisms to offer security services such as authentication, secret preservation and automatic attacks detection commonly known as Intrusion Detection.

Security is crucial to the success of active networking especially when the current network is characterized by a dynamic nature and increasing distribution. Traditional network relies on security mechanisms and policies deployed on the underlying operating system. Nevertheless, these measures are insufficient and they present, in general, a set of flows that result security vulnerabilities. The field of automated computer security intrusion detection gives result to secret multi agent preservation using authentication measurement network threat. The goal of this chapter is to analyze events on the network and identify manifestations of attacks. Commercial solutions are generally centralized and suffer from significant limitations when used in high-speed networks. The identification of distributed intrusions threats requires cooperation of different sensors so it is advisable to consider mobile devices as a challenge to intrusion detection. To distribute automatic intrusion detection can use mobile and intelligent multi agents throughout the measurement Authentication Network.

Multi agent systems are used in various applications such as workflow, scheduling and optimization. An agent is a physical or logical entity characterized by many attributes. In a traditional approach, each component represents a different Network Management (NM) function that may or may not be autonomous. When a new network technology is introduced or an old technology is upgraded, each network management component must be accessed, changed, debugged, and the filtered mechanisms for processing data must be reevaluated, The advantage of the new approach in this chapter is, when a new method of analyzing data is developed, this method can be incorporated into the architecture as a new multi agent. The adjustments are then limited to register that multi agent and giving the multi agent ability to produce and evaluate agent-to-agent messages. Thus, the overhead for changes is much less than with traditional approaches (seminarproject, 2010).

An agent can be a person, a machine, a piece of software, or a variety of other things. The basic dictionary definition of agent is one who acts. However, for developing Information Technology (IT) systems, such a definition is too general: IT-related agents need additional properties. Some of the properties that agents may possess in various combinations include the following (Coursehero, 2013):

Key Terms in this Chapter

Multi Agent System (MAS): Architectures can be considered organizations composed of autonomous and proactive agents that interact with one another in order to cooperate and then achieve either a common goal or simply their own goals.

Intrusion Detection System (IDS): Faced with the problem of performing a huge amount of data over transfer.

Security Agent: The security of a distributed application can be an important issue. The level of security depends on the sensitivity of the information in the system. System information includes information communicated between agents, as well as the information stored with each agent. With distributed applications that interface to external systems.

Multi Agent Systems: Used in various applications such as workflow, scheduling and optimization. An agent is a physical or logical entity characterized by many attributes.

Agent Platform: The management of agents is recognized to be an important part of an agent platform. This certainly holds for large-scale multiage systems deployed on heterogeneous and open systems.

Automatic Intrusion Detection: The automatic intrusion detection can preservation secret multi agent using authentication measurement network threat that proposed system security multi agent distributed system to design a platform for security in order to be applied in distributed system by using the multi agent systems and applying intrusion detection security measurement method (Rijndael encryption) to prevent it.

Complete Chapter List

Search this Book:
Reset