Vulnerability assessment through mobile agents

被引:2
|
作者
Mallah, GA [1 ]
Shaikh, ZA [1 ]
机构
[1] FAST NU, Karachi, Pakistan
来源
E-TECH 2004 | 2004年
关键词
D O I
10.1109/ETECH.2004.1353850
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Vulnerability assessment is the process of measuring and prioritizing the risks associated with network- and host based systems to allow balance planning of technologies and activities that manage business risk. That is useful for adapting security policy, Analysis of vulnerabilities, and creation of reports that effectively communicate security vulnerability discoveries and detailed corrective actions to all levels of an organization. While Vulnerability assessment is not a new technology, mobile agents offer many advantages to the traditional implementations. The most significant contribution is the increased ability for system administrators to quickly and easily adds distributed components to existing systems that can look for newly published vulnerabilities. This paper suggests the Vulnerability Assessment through Mobile Agents where both Network and Host-based technologies in coordinated fashion using Mobile Agents will provide the best vulnerability assessment for measuring an organization's security risks. Mobile agent targets the intended host or network, capture, analyze, scan all vulnerabilities and report to the master agent/server for comprehensive analysis & security assessment, and master agent will act accordingly. The paper will also address advantages and issues regarding its implementation.
引用
收藏
页码:92 / 96
页数:5
相关论文
共 50 条
  • [31] Drinking water vulnerability assessment after disinfection through chlorine
    Di Cristo, C.
    Leopardi, A.
    Quintiliani, C.
    de Marinis, G.
    COMPUTING AND CONTROL FOR THE WATER INDUSTRY (CCWI2015): SHARING THE BEST PRACTICE IN WATER MANAGEMENT, 2015, 119 : 389 - 397
  • [32] Vulnerability Assessment for Applications Security Through Penetration Simulation and Testing
    Lachkov, Petar
    Tawalbeh, Lo'ai
    Bhatt, Smriti
    JOURNAL OF WEB ENGINEERING, 2022, 21 (07): : 2187 - 2208
  • [33] Finescale Assessment of Mobile Home Tornado Vulnerability in the Central and Southeast United States
    Strader, Stephen M.
    Ashley, Walker S.
    WEATHER CLIMATE AND SOCIETY, 2018, 10 (04) : 797 - 812
  • [34] Mobile agents and Java']Java mobile agents toolkits
    Horvat, D
    Cvetkovic, D
    Milutinovic, V
    Kocovic, P
    Kovacevic, V
    TELECOMMUNICATION SYSTEMS, 2001, 18 (1-3) : 271 - 287
  • [35] Assessment of Urban Neighbourhoods' Vulnerability through an Integrated Vulnerability Index (IVI): Evidence from Barcelona, Spain
    Piasek, Gonzalo
    Aragon, Iraide Fernandez
    Shershneva, Julia
    Garcia-Almirall, Pilar
    SOCIAL SCIENCES-BASEL, 2022, 11 (10):
  • [36] Mobile agents for mobile users
    van Thanh, D
    Steensen, S
    Audestad, JA
    INTELLIGENCE IN NETWORKS, 2000, 30 : 135 - 148
  • [37] Mobile crowdsensing with mobile agents
    Leppanen, Teemu
    Lacasia, Jose Alvarez
    Tobe, Yoshito
    Sezaki, Kaoru
    Riekki, Jukka
    AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 2017, 31 (01) : 1 - 35
  • [38] Mobile crowdsensing with mobile agents
    Teemu Leppänen
    José Álvarez Lacasia
    Yoshito Tobe
    Kaoru Sezaki
    Jukka Riekki
    Autonomous Agents and Multi-Agent Systems, 2017, 31 : 1 - 35
  • [39] Mobile agents for mobile monitoring
    Zheng, X
    Hart, D
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2003, : 405 - 410
  • [40] Mobile Crowdsensing with Mobile Agents
    Leppanen, Teemu
    Lacasia, Jose Alvarez
    Tobe, Yoshito
    Sezaki, Kaoru
    Riekki, Jukka
    AAMAS'16: PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS, 2016, : 738 - 739