Eng During last 365 days Approved articles: 2004,   Articles in work: 336 Declined articles: 786 
Library
Articles and journals | Tariffs | Payments | Your profile

Back to contents

Security Model Based on a Multi-Agent System
Lyapustin Anton

Post-graduate student, department of Design and Safety of Computer Systems

197101, Russia, Sankt-Peterburg, g. Sankt-Peerburg, Kronverkskii pr., 49, Universitet ITMO

Lyapustinae@gmail.com

 

 
Kolesnikova Svetlana

Postgraduate Student, Department of Computer Security Systems Design, University of ITMO

197101, Russia, Saint Petersburg, g. Saint Petersburg, Kronverkskii pr., 49, Universitet ITMO

kolesnikovasy@corp.ifmo.ru

 

 
Mel'nik Danil

Postgraduate Student, Department of Computer Security Systems Design, University of ITMO

191186, Russia, Saint Petersburg, g. Saint Petersburg, ul. Bol'shaya Morskaya, 24, of. 101

melnikdanil@gmail.com

 

 

Abstract.

The article is devoted to the urgent problem of ensuring the security of heterogeneous information platforms using a multi-agent threat detection system. The object of the study is a multi-agent platform. The authors pay special attention to such aspects of the topic as: security of multi-agent platforms, management of threat detection agents, interconnection between different threat detection agents, vulnerability in multi-agent platforms. Trends are being considered for the development of new distributed security models. The paper presents a multi-agent architecture for security services, as well as a general scenario for deploying security in multi-agent threat detection systems. The paper presents a multi-agent architecture for security services, as well as a general scenario for deploying security in multi-agent threat detection systems. Using a multi-agent system approach to a security model that provides control from the sender using the mobility and extensibility characteristics of the agent. The multi-agent protection system model for heterogeneous information platforms provides an improved approach for online communications, providing flexible mechanisms for the comprehensive protection of heterogeneous information platforms that can satisfy various security requirements and provide better control over the data to its sender.

Keywords: threat detection agent, heterogeneous information platforms, multiagent platform, intelligent protection system, threat detection, information security, analysis systems, detection algorithms, agent platform, multi-agent system

DOI:

10.7256/2454-0714.2018.3.26575

Article was received:

11-06-2018


Review date:

13-06-2018


Publish date:

11-10-2018


This article written in Russian. You can find full text of article in Russian here .

References
1.
Lange D.B., Mitsuru O. Seven good reasons for mobile agents // Communications of the ACM. 1999.-Vol.42 3. P. 88-89.
2.
Specification for the Advanced Encryption Standard (AES): Federal Information Processing Standards Publication 197. National Institute of Standards and Technology (NIST), 2001.
3.
Barker W.C. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher.-National Institute of Standards and Technology (NIST), 2008.
4.
Schneier B., et al. Twofish: A 128-bit Block Cipher /In: 1st AES Conference, 1998.
5.
Wheeler D., Needham R. TEA, a Tine Encryption Algorithm. Cambridge Security Workshop Proceedings. 1994.-809. P. 363-369.
6.
Schneier B. Description of a New Variable-Length Key, 64-bit Block Cipher. Cambridge Security Workshop Proceedings, 1994. P. 340-346.
7.
A Security Scan Tool returns SSL Server Support Weak Encryption Vulnerability.-http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21384688.
8.
Grimley M.J., Monroe B.D. Protecting the integrity of agents^ an exploration into letting agents loose in an unpredictable world //Communications of the ACM. 1999.-Vol.5. P. 10-17.
9.
Roth V. On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection /In: Proceedings of the 5th International Conference on Autonomous agents, 2001