By Topic

Multiple intelligent agent supported Internet security system: issues, current solutions, and a proposed approach

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Lin Zeng ; Dept. of Inf. Syst., City Univ. of Hong Kong, Kowloon, Hong Kong ; huaiqing Wamg ; Lee, M.K.O.

The Internet has become a common target to attack because of security concerns. Reports of incidents, such as attempted and successful intrusions, have grown dramatically. Several studies have shown that many individuals and companies are abstaining from joining the Internet simply because of such security concerns. The article presents an innovative approach to Internet security which is based on a multiple intelligent agent architecture. This multi agent based security system is focused on one network domain (subnet) only. Four kinds of agents are deployed in the system. They are User Agent, Domain Security Agent (DS Agent), Access Control Agent (AC Agent), and Audit Agent. A Security Information Repository is used to store security information for the network domain, including access information, user profiles, application profiles, authentication keys, etc. These agents communicate with each other through the Information Broker which runs as a co-ordinator not only for the security agents but also for all of the accessible applications in the subnet. A firewall is used as the interface between the subnet and the Internet. Its main function is to filter out the requests which intend to bypass the Information Broker. Additionally, in order to handle the requests from users in other subnets, agents may contact their peer agents in the remote network through the Internet

Published in:

Intelligent Processing Systems, 1997. ICIPS '97. 1997 IEEE International Conference on  (Volume:1 )

Date of Conference:

28-31 Oct 1997