Skip to main content

2024 | OriginalPaper | Buchkapitel

8. Security Provision for the Internet of Intelligence Using Autonomous Mobile Agents

verfasst von : Marcel Ohanga Odhiambo, Weston Mwashita

Erschienen in: From Internet of Things to Internet of Intelligence

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An environment for devices to collect, process, and communicate information is made possible by the Internet of Intelligence. The data that is shared could be private, sensitive, financial, or necessary for regular business operations. Using intrusion detection and prevention techniques is necessary to prevent unauthorized access and ensure the proper operation of the Internet of Intelligence. Intrusion detection is frequently used as a second line of defense to safeguard computer networks, in addition to intrusion prevention techniques such as authentication, firewalls, and cryptography that are used as a first line of defense. The crucial topic of security management is the main emphasis of this chapter. One of the most important issues in network security management today is intrusion detection. A few current systems are reexamined to highlight their benefits and drawbacks. The technology of multi-agent systems can be helpful for effectively developing and maintaining secured networks. Features such as autonomy, adaptability, and flexibility of the intelligent agent system allow the management of wireless network evolution in a more controlled way.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat K. Indermaur, Baby steps. Byte, 97–104 (1995) K. Indermaur, Baby steps. Byte, 97–104 (1995)
2.
Zurück zum Zitat G. O’Hares, N. Jennings, Foundations of Distributed Artificial Intelligence (Wiley, 1996) G. O’Hares, N. Jennings, Foundations of Distributed Artificial Intelligence (Wiley, 1996)
3.
Zurück zum Zitat K. Boudaoud, H. Labiod, J. Labetoulle, Towards a New Approach for Intrusion Detection with Intelligent Agents (Eurecome Institute Corporate and Mobile Communications Laboratories, Sophia- Antipolis, 2000) K. Boudaoud, H. Labiod, J. Labetoulle, Towards a New Approach for Intrusion Detection with Intelligent Agents (Eurecome Institute Corporate and Mobile Communications Laboratories, Sophia- Antipolis, 2000)
4.
Zurück zum Zitat K. Alagha, H. Labiod, A new approach towards an adaptive wireless ATM network. ACM MONET J., Baltzer Publishers 4(2) (1999) K. Alagha, H. Labiod, A new approach towards an adaptive wireless ATM network. ACM MONET J., Baltzer Publishers 4(2) (1999)
5.
Zurück zum Zitat R. Heady, G. Luger, A. Maccabe, M. Servilla, The Architecture of a Network Level Intrusion Detection System: Technical Report (University of New Mexico, Department of Computer Science, 1990)CrossRef R. Heady, G. Luger, A. Maccabe, M. Servilla, The Architecture of a Network Level Intrusion Detection System: Technical Report (University of New Mexico, Department of Computer Science, 1990)CrossRef
6.
Zurück zum Zitat L.T. Heberlein, B. Mukherjee, K.N. Levitt, Network intrusion detection. IEEE Netw. J. 8, 26–41 (1994)CrossRef L.T. Heberlein, B. Mukherjee, K.N. Levitt, Network intrusion detection. IEEE Netw. J. 8, 26–41 (1994)CrossRef
8.
Zurück zum Zitat G.B. White, E.A. Fisch, U.W. Pooch, Co-operating security managers: A peer-based intrusion detection system. IEEE Netw. J. 10, 20–23 (1996)CrossRef G.B. White, E.A. Fisch, U.W. Pooch, Co-operating security managers: A peer-based intrusion detection system. IEEE Netw. J. 10, 20–23 (1996)CrossRef
9.
Zurück zum Zitat N.R. Jennings, K. Sycara, M.J. Wooldridge, A Roadmap of Agent Research and Development: Autonomous Agents and Multi-Agent Systems (1998) N.R. Jennings, K. Sycara, M.J. Wooldridge, A Roadmap of Agent Research and Development: Autonomous Agents and Multi-Agent Systems (1998)
10.
Zurück zum Zitat M.N. Huhns, Multi-agent Systems. Tutorial at the European Agent Systems Summer School (EASSS’99) (1999) M.N. Huhns, Multi-agent Systems. Tutorial at the European Agent Systems Summer School (EASSS’99) (1999)
11.
Zurück zum Zitat I. Satoh, Building reusable mobile agents for network management. IEEE J. (2003) I. Satoh, Building reusable mobile agents for network management. IEEE J. (2003)
12.
Zurück zum Zitat M. Wooldridge, N.R. Jennings, Intelligent agents: Theory and practice. Knowl. Eng. Rev. 10, 115 (1995)CrossRef M. Wooldridge, N.R. Jennings, Intelligent agents: Theory and practice. Knowl. Eng. Rev. 10, 115 (1995)CrossRef
13.
Zurück zum Zitat B. Bieszczad, T. Pagurek, T. White, Mobile agents for network management. IEEE Commun. Surv. 1, 2 (1998)CrossRef B. Bieszczad, T. Pagurek, T. White, Mobile agents for network management. IEEE Commun. Surv. 1, 2 (1998)CrossRef
14.
Zurück zum Zitat T.C. Du, E.Y. Li, A.P. Chang, Mobile agents in distributed network management. Commun. ACM 46, 127 (2003)CrossRef T.C. Du, E.Y. Li, A.P. Chang, Mobile agents in distributed network management. Commun. ACM 46, 127 (2003)CrossRef
15.
Zurück zum Zitat C. Bohoris, G. Pavlou, H. Cruickshank, Using mobile agents for network performance management, in Proceedings of the IFIP/ IEEE, Network Operations and Management Symposium (NOMS’00), (Hawaii, U.S.A, 2000) C. Bohoris, G. Pavlou, H. Cruickshank, Using mobile agents for network performance management, in Proceedings of the IFIP/ IEEE, Network Operations and Management Symposium (NOMS’00), (Hawaii, U.S.A, 2000)
Metadaten
Titel
Security Provision for the Internet of Intelligence Using Autonomous Mobile Agents
verfasst von
Marcel Ohanga Odhiambo
Weston Mwashita
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-55718-7_8

Neuer Inhalt