Vulnerability assessment through mobile agents

被引:2
|
作者
Mallah, GA [1 ]
Shaikh, ZA [1 ]
机构
[1] FAST NU, Karachi, Pakistan
来源
E-TECH 2004 | 2004年
关键词
D O I
10.1109/ETECH.2004.1353850
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Vulnerability assessment is the process of measuring and prioritizing the risks associated with network- and host based systems to allow balance planning of technologies and activities that manage business risk. That is useful for adapting security policy, Analysis of vulnerabilities, and creation of reports that effectively communicate security vulnerability discoveries and detailed corrective actions to all levels of an organization. While Vulnerability assessment is not a new technology, mobile agents offer many advantages to the traditional implementations. The most significant contribution is the increased ability for system administrators to quickly and easily adds distributed components to existing systems that can look for newly published vulnerabilities. This paper suggests the Vulnerability Assessment through Mobile Agents where both Network and Host-based technologies in coordinated fashion using Mobile Agents will provide the best vulnerability assessment for measuring an organization's security risks. Mobile agent targets the intended host or network, capture, analyze, scan all vulnerabilities and report to the master agent/server for comprehensive analysis & security assessment, and master agent will act accordingly. The paper will also address advantages and issues regarding its implementation.
引用
收藏
页码:92 / 96
页数:5
相关论文
共 50 条
  • [21] Listening Skills Assessment through Computer Agents
    Tanaka, Hiroki
    Negoro, Hideki
    Iwasaka, Hidemi
    Nakamura, Satoshi
    ICMI'18: PROCEEDINGS OF THE 20TH ACM INTERNATIONAL CONFERENCE ON MULTIMODAL INTERACTION, 2018, : 492 - 496
  • [22] Listening skills assessment through computer agents
    Tanaka, Hiroki
    Iwasaka, Hidemi
    Negoro, Hideki
    Nakamura, Satoshi
    ICMI 2018 - Proceedings of the 2018 International Conference on Multimodal Interaction, 2018, : 492 - 496
  • [23] Providing customisable network management services through mobile agents
    Griffin, D
    Pavlou, G
    Georgatsos, P
    TELECOMMUNICATIONS AND IT CONVERGENCE TOWARDS SERVICE E-VOLUTION, 2000, 1774 : 209 - 226
  • [24] Secure mobile agents applications: Implementation through platform services
    Ametller, J
    Robles, S
    Borrell, J
    MOBILE AGENTS FOR TELECOMMUNICATION APPLICATIONS, PROCEEDINGS, 2003, 2881 : 265 - 274
  • [25] Automated management of IP networks through policy and mobile agents
    Yang, K
    Galis, A
    Mota, T
    Gouveris, S
    MOBILE AGENTS FOR TELECOMMUNICATION APPLICATIONS, PROCEEDINGS, 2002, 2521 : 249 - 258
  • [26] Maintaining specialized search engines through mobile filter agents
    Theilmann, W
    Rothermel, K
    COOPERATIVE INFORMATION AGENTS III, PROCEEDINGS, 1999, 1652 : 208 - 219
  • [27] Assessment as pedagogy: inviting authenticity through relationality, vulnerability and wonder
    Timperley, Claire
    Schick, Kate
    TEACHING IN HIGHER EDUCATION, 2025, 30 (03) : 592 - 607
  • [28] Seismic vulnerability through drift assessment for bridges with geometrical irregularities
    Gomez-Soberon, M. Consolacion
    Perez, Edgar
    Salas, Daymaru
    De Leon-Escobedo, David
    EUROPEAN JOURNAL OF ENVIRONMENTAL AND CIVIL ENGINEERING, 2022, 26 (03) : 919 - 932
  • [29] Drought vulnerability assessment in Karnataka : Through composite climatic index
    Srinivasareddy, G. S.
    Shivakumarnaiklal, H. S.
    Keerthy, N. G.
    Garag, Prasad
    Jothi, Emily Prabha
    Challa, O.
    MAUSAM, 2019, 70 (01): : 159 - 170
  • [30] Reducing Disaster Risk through Vulnerability Assessment: An Agricultural Perspective
    van Zyl, Koos
    JAMBA-JOURNAL OF DISASTER RISK STUDIES, 2006, 1 (01): : 18 - 23