• 제목/요약/키워드: network agents

검색결과 478건 처리시간 0.027초

IP Agent 기반 IPv6 주소 관리 시스템 (IPv6 Address Management System Based on IP Agents)

  • 이동일;홍윤환;김명균
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 추계학술대회
    • /
    • pp.1051-1054
    • /
    • 2013
  • 기존의 IPv4주소의 한계성 때문에 전세계적으로 IPv6의 도입이 점점 가속화되고 있다. IPv6 시스템에서는 자동주소설정 기능으로 인해 각 호스트가 주소를 자동적으로 얻을 수 있다. 하지만 어떤 허가되지 않은 사용자가 악의적인 목적으로 주소를 얻고 접근할 수 있는 가능성도 존재하기 때문에 IP 주소에 대한 관리가 더욱더 중요시된다. 이를 위해서 IPv6 환경에서 인가된 호스트를 관리, 인가되지 않은 호스트의 접근을 차단하고 특정한 웹페이지로 유도하여 시스템의 보안을 유지하는 IP Agent 기반 IPv6 주소 관리 시스템을 제안한다.

  • PDF

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques

  • El-Semary, Aly M.;Mostafa, Mostafa Gadal-Haqq M.
    • Journal of Information Processing Systems
    • /
    • 제6권4호
    • /
    • pp.481-500
    • /
    • 2010
  • The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools is an Intrusion detection system which can be classified based on detection approachs as being signature-based or anomaly-based. Even though intrusion detection systems are well defined, their cooperation with each other to detect attacks needs to be addressed. Consequently, a new architecture that allows them to cooperate in detecting attacks is proposed. The architecture uses Software Agents to provide scalability and distributability. It works in two modes: learning and detection. During learning mode, it generates a profile for each individual system using a fuzzy data mining algorithm. During detection mode, each system uses the FuzzyJess to match network traffic against its profile. The architecture was tested against a standard data set produced by MIT's Lincoln Laboratory and the primary results show its efficiency and capability to detect attacks. Finally, two new methods, the memory-window and memoryless-window, were developed for extracting useful parameters from raw packets. The parameters are used as detection metrics.

Distributed Information Extraction in Wireless Sensor Networks using Multiple Software Agents with Dynamic Itineraries

  • Gupta, Govind P.;Misra, Manoj;Garg, Kumkum
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권1호
    • /
    • pp.123-144
    • /
    • 2014
  • Wireless sensor networks are generally deployed for specific applications to accomplish certain objectives over a period of time. To fulfill these objectives, it is crucial that the sensor network continues to function for a long time, even if some of its nodes become faulty. Energy efficiency and fault tolerance are undoubtedly the most crucial requirements for the design of an information extraction protocol for any sensor network application. However, most existing software agent based information extraction protocols are incapable of satisfying these requirements because of static agent itineraries and large agent sizes. This paper proposes an Information Extraction protocol based on Multiple software Agents with Dynamic Itineraries (IEMADI), where multiple software agents are dispatched in parallel to perform tasks based on the query assigned to them. IEMADI decides the itinerary for an agent dynamically at each hop using local information. Through mathematical analysis and simulation, we compare the performance of IEMADI with a well known static itinerary based protocol with respect to energy consumption and response time. The results show that IEMADI provides better performance than the static itinerary based protocols.

An Autonomous Optimal Coordination Scheme in a Protection System of a Power Distribution Network by using a Multi-Agent Concept

  • Hyun, Seung-Ho;Min, Byung-Woon;Jung, Kwang-Ho;Lee, Seung-Jae;Park, Myeon-Song;Kang, Sang-Hee
    • KIEE International Transactions on Power Engineering
    • /
    • 제2A권3호
    • /
    • pp.89-94
    • /
    • 2002
  • In this paper, a protection system using a Multi-Agent concept for power distribution networks is proposed. Every digital over current relay(OCR) is developed as an agent by adding its own intelligence, self-tuning and communication ability. The main advantage of the Multi-Agent concept is that a group of agents work together to achieve a global goal which is beyond the ability of each individual agent. In order to cope with frequent changes in the network operation condition and faults, an OCR agent, suggested in this paper, is able to detect a fault or a change in the network and find its optimal parameters for protection in an autonomous manner considering information of the whole network obtained by communication between other agents. Through this kind of coordination and information exchanges, not only a local but also a global protective scheme is completed. Simulations in a simple distribution network show the effectiveness of the suggested protection system.

계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션 (Application of Contract Net Protocol to the Design and Simulation of Network Security Model)

  • 서경진;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제12권4호
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2003년도 Proceeding
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

Dynamically Adaptable Mobile Agents for Scaleable Software and Service Management

  • Brandt, Raimund;Hortnag, Chistian;Reiser, Helmut
    • Journal of Communications and Networks
    • /
    • 제3권4호
    • /
    • pp.307-316
    • /
    • 2001
  • Two hard sub-problems have emerged relating to the use of mobile agents for service management tasks. First, what is their impact on security, and second, how can they receive a flexible capacity to adapt to an open range of different environments on demand, without introducing trio stringent prior assumptions. In this paper, we present work towards solving the second problem, which is of particular interest to management software, because it typically needs to excert fine-grained and therefore particular resource control. We suggest a mechanism that reassembles mobile agents from smaller sub-components during arrival at each hop. The process incorporates patterns of unmutable and mutable sub-components, and is informed by the conditions of each local environment. We discuss different kinds of software adaptation and draw a distinction between static and continuous forms. Our software prototype for dynamic adaptation provides a concept far exchanging environment-dependent implementations of mobile agents during runtime. Dynamic adaptation enhances efficiency of mobile code in terms of bandwidth usage and scalability.

  • PDF

네트워크를 이용한 에이젼트 기반 설계 환경 구축 (A Construction Agent-based Design Environment using a Network)

  • 안상준;이수홍
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 1995년도 추계학술대회 논문집
    • /
    • pp.697-701
    • /
    • 1995
  • The network encironment includes a number of autonomous agents which are widely distributed, have different platforms, and change very dynamically. The information system operated on this environment must solve some basic problems; restrictive client-server models, heterogeneous systems, and intellignet agents. We are using KQML for knowledge management. Java language provides solutions against a strong server dependency and a heterogenous troubles. We introduce KQML as an agent communication language and JATLite as a java agent template. these increase an efficiency of communication on network and enable us to use resources distributed in world wide web. Also, we describe a new agent system architecture and implement it through an example scenario

  • PDF

자바 에이젼트를 이용한 분산컴퓨팅 환경 구현 (Implementation of Distributed Computing Environment using Java Agent)

  • 서건원;이길흥
    • 한국컴퓨터산업학회논문지
    • /
    • 제3권2호
    • /
    • pp.199-208
    • /
    • 2002
  • 컴퓨팅 환경의 변화 때문에 최근 에이젼트 기술이 주목을 받고 있다. 네트워크에 에이젼트를 분산 배치시킴으로서 서비스의 실현이 용이한 위치에서 필요한 서비스를 신속하게 제공하게 함으로서 네트워크의 효율성을 증대시킬 필요성이 점점 커지고 있다. 본 논문에서는 자바로 프로그래밍한 에이젼트를 실제 서비스의 실현이 용이한 위치에 있는 네트워크에 배치하고, 매니져에서는 에이젼트에 접속하여 서비스코드의 URL을 에이젼트에 알려주었다. 에이젼트는 해당 URL에서 서비스코드를 다운로드받아서 실행시켜 그 결과를 매니져에게 돌려주는 분산컴퓨팅 환경을 자바로 구현해본다.

  • PDF

홈 네트워크 응용을 위한 Multi Agent System (MAS) 프레임워크 (Multi Agent System (MAS) Framework for Home Network Application)

  • 장인훈;심귀보
    • 한국지능시스템학회논문지
    • /
    • 제17권1호
    • /
    • pp.80-85
    • /
    • 2007
  • 홈네트워크 시스템의 본격적인 보급과 함께 가정용서비스 로봇의 최근 연구 성과들은 인간과 지능로봇이 가정에 공존하며 서로 의사소통을 할 수 있는 시대가 가까운 미래에 현실화 될 수 있음을 보여주고 있다. 한편 가정의 환경적인 특징은 open이기 때문에 그러한 환경에 적응하고 주어진 임무를 수행하는 데는 단일 로봇 또는 단일 홈서버보다는 로봇을 포함하는 홈네트워크 시스템 내의 여러 장치들이 어울려 분산처리를 수행하는 multi-agent 시스템이 일반적으로 더 좋다고 알려져 있다. 따라서 본 논문은 홈네트워크 시스템을 가진 가정에서 필요한 agent들을 정의하기 위해 framework 모델을 구축하고 각 agent 간의 통신 protocol architecture를 제시한다. 이를 위해 로봇 또는 홈서버의 단일 지능이나 기능보다는 그 안에 존재하는 복수개의 agent instance들의 집합으로서 agent를 정의하고, 각 agent 내외에서 agent들 사이의 협력(cooperation)과 타협(negotiation)을 통해 환경과 적응하는 방법 및 사람과 교감(interactive)하는 방법을 제시한다.