Architecture for design and development of security systems based on agent technology

M. Guadalupe Cota*, J. Pablo Soto

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper presents an hybrid architecture of agents for design and development of security systems, which is named ARSEC-AMS (Security Architecture for Multi-Agent System). ARSEC-AMS is organized in functional modules that facilitate the implementation of mechanisms for interaction and reasoning of agents. The architecture approach is different from other techniques and methodologies that have been applied in the development of protection tools, which have been successful but have been unable to control events on the topic "Day Zero", that occurs when new intrusion techniques that are used by malicious programs or users are not recognized by the protection programs and try to exploit vulnerabilities that compromise the computer resources. It is composed of the following modules: an interpreter to filter the events registered, a module of blackboard, a module deliberative-cognitive, a security module and a reactive module, which together are a platform for achieving the security goals previously established.

Original languageEnglish
Title of host publicationProceedings of the 2011 International Conference on Artificial Intelligence, ICAI 2011
Pages826-831
Number of pages6
StatePublished - 2011
Event2011 International Conference on Artificial Intelligence, ICAI 2011 - Las Vegas, NV, United States
Duration: 18 Jul 201121 Jul 2011

Publication series

NameProceedings of the 2011 International Conference on Artificial Intelligence, ICAI 2011
Volume2

Conference

Conference2011 International Conference on Artificial Intelligence, ICAI 2011
Country/TerritoryUnited States
CityLas Vegas, NV
Period18/07/1121/07/11

Keywords

  • Agent
  • Architecture
  • Grammar
  • Security

Fingerprint

Dive into the research topics of 'Architecture for design and development of security systems based on agent technology'. Together they form a unique fingerprint.

Cite this