Abstract
Nowadays many intranets are deployed without enforcing any network security policy and just relying on security technologies such as firewalls or antivirus. In addition, the number and type of network entities are no longer fixed. Typically, laptops, PDAs or mobile phones need to have access to network resources occasionally. Therefore, it is important to design flexible systems that allow an easy administration of connectivity without compromising security. This article shows how software agents may provide secure configurations to a computer network in a distributed, autonomous and dynamic manner. Thus, here we describe the system architecture of a prototype, the negotiation protocol it uses and how it works in a sample scenario.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Beale, J., Deraison, R., Meer, H., Temmingh, R., Walt, C.V.D.: Nessus Network Auditing. Syngress Publishing (2004)
Bellifemine, F., Caire, G., Poggi, A., Rimassa, G.: Jade: A software framework for developing multi-agent applications. lessons learned. Information and Software Technology 50(1-2), 10–21 (2008)
Bishop, M.A.: The Art and Science of Computer Security. Addison-Wesley Longman Publishing Co., Inc., Boston (2002)
FIPA: FIPA ACL Message Structure Specification. FIPA (2001), http://www.fipa.org/specs/fipa00061/
Ioannidis, S., Keromytis, A.D., Bellovin, S.M., Smith, J.M.: Implementing a distributed firewall. In: CCS 2000: Proceedings of the 7th ACM conference on Computer and communications security, pp. 190–199. ACM, New York (2000)
Krügel, C., Toth, T., Kirda, E.: Sparta, a mobile agent based instrusion detection system. In: Proceedings of the IFIP TC11 WG11.4 First Annual Working Conference on Network Security, pp. 187–200. Kluwer, B.V., Deventer (2001)
Udupi, Y.B., Singh, M.P.: Multiagent policy architecture for virtual business organizations. In: Proceedings of the IEEE International Conference on Services Computing, SCC 2006, pp. 44–51. IEEE Computer Society, Washington (2006)
Udupi, Y.B., Singh, M.P.: Governance of cross-organizational service agreements: A policy-based approach. In: Proceedings of the 2007 IEEE International Conference on Services Computing, SCC 2007, pp. 36–43. IEEE Computer Society, Salt Lake City (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Martin, P., Orfila, A., Carbo, J. (2009). Negotiation of Network Security Policy by Means of Agents. In: Demazeau, Y., Pavón, J., Corchado, J.M., Bajo, J. (eds) 7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009). Advances in Intelligent and Soft Computing, vol 55. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00487-2_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-00487-2_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00486-5
Online ISBN: 978-3-642-00487-2
eBook Packages: EngineeringEngineering (R0)