Abstract
In improving security for the networks of today and tomorrow there are two important features that must be considered. The first is the open and distributed nature of today’s enterprise networks. And the second is their dynamic nature, not just in terms of size, but in terms of changing services offered, and the mobility of users. Of particular importance, then is the ability to rapidly apply new security policies in a system. Equally, a system should incorporate as much “intelligence” and reactivity in the system as possible. Many existing security solutions are designed for a static, known network, and are therefore unsuited to the requirements of today’s enterprise networks. In order to provide a system that can readily handle these requirements, recent works have shown that multi-agents systems offer a promising platform. The focus of our work concerns one critical security management issue that is intrusion detection. In this paper, we propose a model of managing security policies in a multi-agents system for intrusion detection.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35620-4_43
Chapter PDF
Similar content being viewed by others
References
R. F. Teixeira de Oliveira, “Gestion des Réseaux avec Connaissance des Besoins: Utilisation des Agents Logiciel”, PhD. thesis ENST, Paris, 1998.
A. S. Rao and M. P. Georgeff, “Intelligent Real-Time Network Management”, Technical report 15, Australian AI Institute, Carlton, Australia, 1991.
K. Boudaoud. “Intrusion Detection: a new approach using a multi-agent system”, PhD thesis, Institut Eurecom/ EPFL, Sophia Antipolis, 2001.
A. S. Rao and M. P. Georgeff, “ BDI — agents: from theory to practice”, Proc. of the First International Conference on Multi — Agent Systems, San Francisco, 1995.
K. Boudaoud and Z. Guessoum. “A Multi-agents System for Network Security Management”. Proc. of the Sixth IFIP Conference on Intelligence in Networks (SmartNet’200), Vienna, Austria, September2000.
S. Heilbronner, “Requirements for Policy-Based Management of Nomadic Computing Infrastructures”, Proc. of the Sixth Workshop of the HP-OVUA, Bologna, June 1999.
R. Wies. “Policies in Integrated Network and Systems Management: Methodologies for the Definition, Transformation and Application of Management Policies”, 1995
N. Yialelis and M. Sloman, “A Security Framework Supporting Domain Based Access Control in Distributed Systems”, Imperial College Research Report Doc 1995/14, Department of Computing, Imperial College of Science Technology and Medicine, 1995.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Boudaoud, K., McCathieNevile, C. (2003). Policy-driven Model for Security Management. In: Gaïti, D., Boukhatem, N. (eds) Network Control and Engineering for QoS, Security and Mobility. NetCon 2002. IFIP — The International Federation for Information Processing, vol 107. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35620-4_36
Download citation
DOI: https://doi.org/10.1007/978-0-387-35620-4_36
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5948-8
Online ISBN: 978-0-387-35620-4
eBook Packages: Springer Book Archive