A mobile agent-based P2P Autonomous Security Hole Discovery system

被引:0
|
作者
Zheng, J [1 ]
Wang, X
Xue, XY
Toh, CK
机构
[1] Fudan Univ, Software Sch, Shanghai 200433, Peoples R China
[2] Fudan Univ, Shanghai Key Lab Intelligent Informat Proc, Shanghai 200433, Peoples R China
[3] Fudan Univ, Dept Comp Sci & Engn, Shanghai 200433, Peoples R China
[4] Queen Mary Univ London, Dept Elect Engn, London E1 4NS, England
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A general or agent-based security system is usually constructed hierarchically and has a central manager acting as head of the whole system. However, the manager becomes a bottleneck for being connected by each client. It can even overload when too many clients request service simultaneously. The whole system may collapse when the central manager is attacked. And these systems are passive to detect and deal with the secure problem. Hereby we present a mobile agent-based P2P Autonomous Security Hole Discovery system (PASHD). It can detect infection and network intrusion based on knowledge of the local host. Viruses will be removed and connection will be refused after identification. In case of a suspicious activity, PASHD initiates a voting approach to make a collective decision and take further action. This system acts self-learning when encountering intrusion or infection with new patterns. And it has the capability of autonomous discovery the security hole of hosts in network. The integration of peer-to-peer behavior with mobile agents reduces latency and load; however, flexibility, effectivity, security and cooperation of the system are enhanced.
引用
收藏
页码:525 / 534
页数:10
相关论文
共 50 条
  • [31] Mobile agent-based security model for distributed system
    Zhang, JY
    Li, YC
    Min, F
    Yang, GW
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 194 - 197
  • [32] Mobile agent-based security model for distributed system
    Qi, L
    Yu, L
    2001 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: E-SYSTEMS AND E-MAN FOR CYBERNETICS IN CYBERSPACE, 2002, : 1754 - 1759
  • [33] P2P and mobile agent based information exchange mode in the shop floor
    He, DQ
    Yan, P
    Liu, F
    Yi, RZ
    Miao, J
    THIRD INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE ENGINEERING: DIGITAL ENTERPRISES AND NONTRADITIONAL INDUSTRIALIZATION, 2003, : 433 - 436
  • [34] Agent-based P2P e-Commerce system and group buy (ID: 3-069)
    Zhang Junyan
    Duan Gang
    Shao Peiji
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1-5: INDUSTRIAL ENGINEERING AND MANAGEMENT INNOVATION IN NEW-ERA, 2006, : 1317 - 1322
  • [35] Agent-based service-oriented intelligent P2P networks for distributed classification
    Gorodetskiy, V.
    Karsaev, O.
    Samoilov, V.
    Serebryakov, S.
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 224 - +
  • [36] Modeling of Agent-Based Complex Network to Detect the Trust of Investors in P2P Platform
    Yan, Yuwei
    Zhang, Jian
    Ma, Xiaomeng
    INTERNATIONAL JOURNAL OF INTELLIGENT INFORMATION TECHNOLOGIES, 2019, 15 (02) : 20 - 31
  • [37] CDP: a Content Discovery Protocol for Mobile P2P Systems
    Yeferny, Taoufik
    Hamad, Sofian
    Belhaj, Salem
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (05): : 28 - 35
  • [38] Chance Discovery based Security Service Selection for Social P2P based Sensor Networks
    Wu, Jun
    Dong, Mianxiong
    Ota, Kaoru
    Li, Jianhua
    Guo, Longhua
    Li, Gaolei
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [39] A MOBILE SPONTANEOUS SEMANTIC P2P SYSTEM
    Schwotzer, Thomas
    PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND APPLICATIONS, 2009, : 977 - 981
  • [40] Research of security mechanism RBAC-based in P2P system
    Niu, Xin-Zheng
    She, Kun
    Lu, Gang
    Zhou, Ming-Tian
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (03): : 493 - 495