Skip to main content

Secure Multi-agent Coordination in a Network Monitoring System

  • Conference paper
  • First Online:
Software Engineering for Large-Scale Multi-Agent Systems (SELMAS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2603))

Abstract

We have developed a mobile-agent based network monitoring system. In this system, multiple agents coordinate with each other to collectively perform network monitoring. This paper deals with the coordination of multiple agents to achieve monitoring functions and failed component recovery. We also address the security needs of our monitoring system, i.e. types of attacks that could be launched on the system, and our solutions to thwart them. Finally, we present our experiences with the system and the resource overhead imposed by it.

This work was supported by National Science Foundation grants ANI 0087514 and EIA 9818338.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jansen, W., Mell, P., Karygiannis, T., Marks, D.: Applying Mobile Agents to Intrusion Detection and Response. National Institute of Standards and Technology Interim Report-6416 (1999)

    Google Scholar 

  2. Fuggetta, A., Picco, G.P., Vigna, G.: Understanding Code Mobility. IEEE Transactions on Software Engineering 24 (1998) 342–361

    Article  Google Scholar 

  3. Harrison, C.G., Chess, D.M., Kershenbaum, A.: Mobile Agents: Are they a good idea? Technical report, IBM Research Division, T.J.Watson Research Center (1995) Available at URL http://www.research.ibm.com/massdist/mobag.ps.

  4. White, G.B., Fisch, E., Pooch, U.: Cooperating Security Managers: A Peer-Based Intrusion Detection System. IEEE Network 10 (1996) 20–23

    Article  Google Scholar 

  5. Stallings, W.: SNMP and SNMPv2: the infrastructure for network management. IEEE Communications Magazine 36 (1998) 37–43

    Article  Google Scholar 

  6. Tripathi, A., Karnik, N., Vora, M., Ahmed, T., Singh, R.: Mobile Agent Programming in Ajanta. In: Proceedings of the 19th International Conference on Distributed Computing Systems. (1999) 190–197

    Google Scholar 

  7. Tripathi, A., Ahmed, T., Pathak, S., Carney, M., Dokas, P.: Paradigms for Mobile Agent-Based Active Monitoring. In: IEEE Network Operations and Management Symposium. (2002) 65–78

    Google Scholar 

  8. Roesch, M.: Snort-Lightweight Intrusion Detection for Networks. In: 13th Systems Administration Conference-LISA. (1999)

    Google Scholar 

  9. Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., Stoner, E.: State of the practice of intrusion detection technologies. Technical Report CMU/SEI-99-TR-028, Software Engineering Institute, Carnegie Mellon University (2000) Available at URL http://www.sei.cmu.edu/.

  10. Karnik, N., Tripathi, A.: Security in the Ajanta Mobile Agent System. Software Practice and Experience31 (2001) 301–329

    Article  MATH  Google Scholar 

  11. Balasubramaniyan, J., Garcia-Fernandez, J.O., Isaco., D., Spafford, E., Zamboni, D.: An Architecture for Intrusion Detection using Autonomous Agents. Technical Report Coast TR 98-05, Department of Computer Sciences, Purdue University (1998)

    Google Scholar 

  12. Bellavista, P., Corradi, A., Stefanelli, C.: An Open Secure Mobile Agent Framework for Systems Management. Journal of Network and Systems Management (JNSM) 7 (1999) 323–339

    Article  MATH  Google Scholar 

  13. Pinheiro, R., Poylisher, A., Caldwell, H.: Mobile Agents for Aggregation of Network Mangagement Data. In: 1st International Symposium on Agent Systems and Applications, and 3rd International Symposium on Mobile Agents. (1999) 130–140

    Google Scholar 

  14. Porras, P.A., Neumann, P.G.: EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In: Proceedings of the 20th National Information Systems Security Conference. (1997) 353–365

    Google Scholar 

  15. Vigna, G., Kemmerer, R.: NetSTAT: A Network-based Intrusion Detection System. Journal of Computer Security 7 (1999) 37–71

    Google Scholar 

  16. Vigna, G., Kemmerer, R., Blix, P.: Designing a Web of Highly-Configurable Intrusion Detection Sensors. In Lee, W., Mé, L., Wespi, A., eds.: Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001). Volume 2212 of LNCS., Davis, CA, Springer-Verlag (2001) 69–84

    Chapter  Google Scholar 

  17. Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer Networks (Amsterdam, Netherlands: 1999) 31 (1999) 2435–2463

    Google Scholar 

  18. Karjoth, G., Lange, D., Oshima, M.: A Security Model for Aglets. IEEE Internet Computing(1997) 68–77

    Google Scholar 

  19. Picco, G., Murphy, A., Roman, G.: LIME: Linda meets mobility. In: Proceedings of the 1999 International Conference on Software Engineering. (1999) 368–377

    Google Scholar 

  20. Cao, J., Feng, X., Lu, J., Das., S.K.: Research feature-Mailbox-based scheme for mobile agent communications. IEEE Computer 35 (2002) 54–60

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tripathi, A.R., Koka, M., Karanth, S., Pathak, A., Ahmed, T. (2003). Secure Multi-agent Coordination in a Network Monitoring System. In: Garcia, A., Lucena, C., Zambonelli, F., Omicini, A., Castro, J. (eds) Software Engineering for Large-Scale Multi-Agent Systems. SELMAS 2002. Lecture Notes in Computer Science, vol 2603. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-35828-5_16

Download citation

  • DOI: https://doi.org/10.1007/3-540-35828-5_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-08772-4

  • Online ISBN: 978-3-540-35828-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics