Full Paper View Go Back

A Security Determination-Reaction Architecture for Heterogeneous Distributed Network

B. Bhasker1 , T. Jagadish Kumar2 , M.V.Kamal 3

  1. Department of CSE, Malla Reddy College of Engineering and Technology, Hyderabad, India.
  2. Department of CSE, Malla Reddy College of Engineering and Technology, Hyderabad, India.
  3. Department of CSE, Malla Reddy College of Engineering and Technology, Hyderabad, India.

Correspondence should be addressed to: bhasker.b90@gmail.com .


Section:Survey Paper, Product Type: Isroset-Journal
Vol.5 , Issue.5 , pp.26-34, Oct-2017


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v5i5.2634


Online published on Oct 30, 2017


Copyright © B. Bhasker, T. Jagadish Kumar, M.V.Kamal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B. Bhasker, T. Jagadish Kumar, M.V.Kamal, “A Security Determination-Reaction Architecture for Heterogeneous Distributed Network,” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.26-34, 2017.

MLA Style Citation: B. Bhasker, T. Jagadish Kumar, M.V.Kamal "A Security Determination-Reaction Architecture for Heterogeneous Distributed Network." International Journal of Scientific Research in Computer Science and Engineering 5.5 (2017): 26-34.

APA Style Citation: B. Bhasker, T. Jagadish Kumar, M.V.Kamal, (2017). A Security Determination-Reaction Architecture for Heterogeneous Distributed Network. International Journal of Scientific Research in Computer Science and Engineering, 5(5), 26-34.

BibTex Style Citation:
@article{Bhasker_2017,
author = {B. Bhasker, T. Jagadish Kumar, M.V.Kamal},
title = {A Security Determination-Reaction Architecture for Heterogeneous Distributed Network},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {10 2017},
volume = {5},
Issue = {5},
month = {10},
year = {2017},
issn = {2347-2693},
pages = {26-34},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=470},
doi = {https://doi.org/10.26438/ijcse/v5i5.2634}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i5.2634}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=470
TI - A Security Determination-Reaction Architecture for Heterogeneous Distributed Network
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - B. Bhasker, T. Jagadish Kumar, M.V.Kamal
PY - 2017
DA - 2017/10/30
PB - IJCSE, Indore, INDIA
SP - 26-34
IS - 5
VL - 5
SN - 2347-2693
ER -

589 Views    283 Downloads    210 Downloads
  
  

Abstract :
The main focus of this paper is to provide a global architectural solution built on the requirements for a reaction after alert detection mechanisms in the frame of Information Systems Security and more particularly applied to telecom infrastructures security. These infrastructures are distributed in nature, therefore the targeted architecture is developed in a distributed perspective and the architecture is elaborated using the multi-agent system. The Multi-Agent System decision-reaction architecture is developed in a distributed perspective and is composed of three basic layers: low level, intermediate level and high level. The low level aim to be the interface between the main architecture and the targeted infrastructure. The intermediate level is responsible of correlating the alerts coming from different domains of the infrastructure and to deploy smartly the reaction actions.This intermediate level is elaborated using multi-agents system that provide the advantages of autonomous and interaction facilities.The high level permits to have a supervision view of the whole infrastructure, and to manage business policy definition.The proposed approach has been successfully experimented for data access control mechanism.The proposed approach has been illustrated based on the network architecture for heterogeneous mobile computing developed by the BARWAN project .Accordingly: The Building Area constitutes the low level. The Campus –Area is the intermediate level. It takes care about the alerts coming from different domains and deploy the reaction actions smartly.The multi-agent system that has been associated to the OntoBayes model for decision support mechanism.This model helps agents to make decisions according to preference values and is built upon ontology based knowledge sharing , bayesian networks based uncertainity management and influence diagram based decision support.

Key-Words / Index Term :
Security Policy; Multi-agents systems Architecture; decision system; reaction; Distributed networks; bayesian network

References :
[1] A. Cuevas, P. Serrano, J. I. Moreno, C. J. Bernardos, J. Jähnert, R. L. Aguiar, V. Marques, Usability and Evaluation of a Deployed 4G Network Prototype, Journal of Communications and Networks, Vol. 7 (2), 2008.
[2] Teo, Joseph Chee Ming; Tan, Chik How; Ng, Jim Mee, Denial-ofservice attack resilience dynamic group key agreement for heterogeneous networks, Telecommun. Syst. 35, No. 3-4, 141-160 (2007).
[3] L. J. LaPadula. State of the Art in Anomaly Detection and Reaction Technical Report MP 99B0000020, Mitre, July 1999.
[4] G.L.F. Santos, Z. Abdelouahab, R.A. Dias, C.F.L. Lima, E. Nascimento , E.M. Cochra. An Automated Response Approach for Intrusion Detection Security Enhancement, Software Engineering and Applications, 2003.
[5] M. Petkac and L. Badger, Security agility in response to intrusion detection in 16th Annual Conference on Computer Security Applications (ACSAC `00), 2000.
[6] C. Feltus, D. Khadraoui, B. de RĂ©mont and A.Rifaut, Business Gouvernance based Policy regulation for Security Incident Response. IEEE Global Infrastructure Symposium, 6 July 2007.
[7] Gateau, D. Khadraoui, C. Feltus, Multi-Agents System Service based Platform in Telecommunication Security Incident Reaction, IEEE Global Information Infrastructure Symposium, 2009.
[8] N. Damianou, N. Dulay, E. Lupu, M. Sloman , The Ponder Policy Specification Language, Workshop on Policies for Distributed Systems and Networks (Policy2001), HP Labs Bristol, 29-31. Springer-Verlag.
[9] Bertino, E., Mileo, A., and Provetti, A. 2005. PDL with Preferences. IEEE international Workshop on Policies For Distributed Systems and Networks, Policy 2005 – Vol. 00, IEEE Computer Society, Washington, DC, 213-222.
[10] Aamodt, A., Plaza, E., 1994. Case-based reasoning: foundational issues, methodological variations, and system approaches. AI Communications IOS Press 7 (1), 39–59.
[11] K.-Y. Lu, C.-C. Sy, A real-time decision-making of maintenance using fuzzy agent, Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 2691-2698
[12] Carrascosa et al., 2006 C. Carrascosa, J. Bajo, V. Julian, J.M. Corchado and V. Botti, Hybrid multi-agent architecture as a real-time problem-solving model, Expert Systems with Applications 34 (2006), pp. 2–17.
[13] Basile, C.; Lioy, A.; Perez, G. Martinez; C., F. J. Garcia; Skarmeta, A. F. Gomez, POSITIF: A Policy-Based Security Management System, Policies for Distributed Systems and Networks, 2007. POLICY’07, pp. 280 – 280.
[14] Torrellas, G.A.S, Modelling a network security systems using multiagents systems engineering, IEEE International Conference on Systems, Man and Cybernetics, 2003. Vol 5, (5-8). 2003 pp 4268 - 4273.
[15] R. Yu, B. Iung, H. Panetto, A multi-agents based E-maintenance system with case-based reasoning decision support, Engineering Applications of Artificial Intelligence, Vol. 16, Issue 4, June 2003, Pages 321-333
[16] http://xml.coverpages.org/draft-seitz-netconf-xacml-00.txt
[17] Cuppens, F., Cuppens-Boulahia, N., Miège, A.: Inheritance hierarchies in the Or-BAC Model ad application in a network environment. In: Second Foundations of Computer Security Workshop (FCS’04), Turku, Finland (2004).
[18] F. Cuppens and A. Miège, Modelling contexts in the Or-BAC model, 19th Annual Computer Security Applications Conference, Las Vegas, December, 2003
[19] IDMEF/RFC4765, Network Working Group: Hervé Debar, France Telecom; D. Curry, Guardian; B. Feinstein, SecureWorks, Inc.; March 2007
[20] B. Gâteau. Modélisation et Supervision d`Institutions Multi-Agents. Ph.D. Thesis, Ecole Supérieure des Mines de Saint-Etienne, 2007.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation