Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1787839.1787853guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Approach to solving security problems using meta-agents in multi agent system

Published: 26 March 2008 Publication History

Abstract

In this paper, we present an approach of integrating meta-agents in Web Services. Web Services requires an appropriate level of security to support business systems to be used by anyone, anywhere, at anytime and any platform. However, the increased use of distributed systems with message passing produces a growing set of security problems. This especially concerns threats and attacks on Web Services consisting of transactions with valuable resources. To prevent possible attacks on Web Services, we propose using meta-agents over software agents in a multi-agent system. The multi-agent system consists of a network of software agents that secure the message passing at the transport and application levels. To avoid attacks on these agents, we use meta-agents to monitor the software agents' actions and then to direct the software agents' work. These meta-agents are also used to handle unexpected events in the actions of the software agents.

References

[1]
Fasli, M.: On agent technology for e-commerce: trust, security and legal issues. The Knowledge Engineering Review 22(1), 3-35 (2007).
[2]
Gorodetski, V., Kotenko, I.: The multi-agent systems for computer network security assurance: frameworks and case studies. In (ICAIS 2002). IEEE International Conference on Artificial Intelligence Systems, pp. 297-302 (2002), ISBN: 0-7695-1733-1.
[3]
Håkansson, A., Hartung, R.: Using Meta-Agents for Multi-Agents in Networks. In: Arabnia, H., et al. (eds.) Proceedings of The 2007 International Conference on Artificial Intelligence, ICAI 2007, vol. II, pp. 561-567. CSREA Press, U.S.A (2007a), http://www.world-academy-of-science.org
[4]
Håkansson, A., Hartung, R.: Calculating optimal decision using Meta-level agents for Multi-Agents in Networks. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part I. LNCS (LNAI), vol. 4692, pp. 180-188. Springer, Heidelberg (2007).
[5]
Moradian, E., Håkansson, A.: Possible attacks on XML Web Services (IJCSNS) International Journal of Computer Science and Network Security 6(1B) (2006), Journal ISSN: 1738-7906.
[6]
Pedireddy, T., Vidal, J.M.: A Prototype MultiAgent Network Security System. In: AAMAS 2003 Proceedings of the second international joint conference on Autonomous agents and multiagent systems, Melbourne, Australia, July 14 - 18 (2003).
[7]
W3C XML Protocol Working Group, http://www.w3.org/TR/
[8]
Nielsen, H.F., Thatte, S.: Web Services Routing Protocol (WS-Routing), http://msdn2.microsoft.com/en-us/library/ms951249.aspx
[9]
Adsett, C., Bernardi, A., Liu, S., Spencer, B.: Realising Weak Work Workflow with Declarative Flexible XML Routing in SOAP (DeFleX) (2004).
[10]
Chelberg, D., Welch, L., Lakshmikumar, A., Gillen, M.: Meta-Reasoning For a Distributed Agent Architecture. In: Proceedings of the South-Eastern Symposium on System Theory, Athens, Ohio, USA, March 18-20, 2001, pp. 377-381 (2001).
[11]
Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach. Prentice-Hall, Inc., Englewood Cliffs (1995).
[12]
Wooldridge, M.J.: Introduction To Multi-Agent Systems. John Wiley and Sons Ltd., Chichester (2002).
[13]
O'Neil, M.: Web Services Security. McGraw-Hill/Osborne, New York (2003).
[14]
Hartman, B., Flinn, D.J., Beznosov, K., Kawamoto, S.: Mastering Web Services Security. Wiley, Chichester (2003).
[15]
Peterson, G.: Security Concepts, Challenges, and Design Considerations for Web Services Integration, Cigital, Inc.; Howard Lipson, Software Engineering Institute (2006), https://buildsecurityin.us-cert.gov/daisy/bsi/articles/ best-practices/assembly/639.html
[16]
Demchenko, Y.: Attacks on Web Services and Grids. White paper (2004).
[17]
Papazoglou, M.: Web Services: Principles and Technology. Pearson Education, Essex England (2008).
[18]
Rosenberg, J., Remy, D.: Securing Web Services with WS-security (2004), ISBN 0-672-32651-5.

Cited By

View all
  • (2011)Layered security architecture for threat management using multi-agent systemACM SIGSOFT Software Engineering Notes10.1145/2020976.202098436:5(1-11)Online publication date: 30-Sep-2011
  • (2010)Controlling security of software development with multi-agent systemProceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part IV10.5555/1893971.1893983(98-107)Online publication date: 8-Sep-2010

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
KES-AMSTA'08: Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
March 2008
909 pages
ISBN:3540785817
  • Editors:
  • Ngoc Thanh Nguyen,
  • Geun Sik Jo,
  • Robert J. Howlett,
  • Lakhmi C. Jain

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 26 March 2008

Author Tags

  1. SOAP
  2. auditing
  3. intelligent agents
  4. meta-agents
  5. multi-agent systems
  6. networks
  7. reliability
  8. security
  9. software agents
  10. web services

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2011)Layered security architecture for threat management using multi-agent systemACM SIGSOFT Software Engineering Notes10.1145/2020976.202098436:5(1-11)Online publication date: 30-Sep-2011
  • (2010)Controlling security of software development with multi-agent systemProceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part IV10.5555/1893971.1893983(98-107)Online publication date: 8-Sep-2010

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media