Improving the security level of the FUSION@ multi-agent architecture

The use of architectures based on services and multi-agent systems has become an increasingly important part of the solution set used for the development of distributed systems. Nevertheless, these models pose a variety of problems with regards to security. This article presents the Adaptive Intrusion Detection Multi-agent System (AIDeMaS), a mechanism that has been designed to detect and block malicious SOAP messages within distributed systems built by service based architectures. AIDeMaS has been implemented as part of FUSION@, a multi-agent architecture that facilitates the integration of distributed services and applications to optimize the construction of highly-dynamic multi-agent systems. One of the main features of AIDeMaS is that is employs case-based reasoning mechanisms, which provide it with great learning and adaptation capabilities that can be used for classifying SOAP messages. This research presents a case study that uses the ALZ-MAS system, a multi-agent system built around FUSION@, in order to confirm the effectiveness of AIDeMaS. The preliminary results are presented in this paper.

[1]  Steve Anderson,et al.  Web Services Secure Conversation Language (WS-SecureConversation) , 2005 .

[2]  G.S.V.R.K. Rao,et al.  An Adaptive Intrusion Detection and Prevention (ID/IP) Framework for Web Services , 2008 .

[3]  Nils Gruschka,et al.  SOA and Web Services: New Technologies, New Standards - New Attacks , 2007, ECOWS 2007.

[4]  Juan M. Corchado,et al.  SCMAS: A distributed hierarchical multi-agent architecture for blocking attacks to databases , 2010 .

[5]  Nils Gruschka,et al.  Protecting Web Services from DoS Attacks by SOAP Message Validation , 2006, SEC.

[6]  Nicholas R. Jennings,et al.  Applying agent technology , 1995, Appl. Artif. Intell..

[7]  T. Yalcinoz,et al.  Implementing soft computing techniques to solve economic dispatch problem in power systems , 2008, Expert Syst. Appl..

[8]  Javier Bajo,et al.  Intelligent environment for monitoring Alzheimer patients, agent technology for health care , 2008, Decis. Support Syst..

[9]  Alexander Elsas Integration of e-Government and e-Commerce with Web Services , 2003, EGOV.

[10]  Mayumi Hori,et al.  Applying XML Web Services into Health Care Management , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[11]  Javier Bajo,et al.  A multi-agent architecture for distributed services and applications , 2009 .

[12]  J. van Leeuwen,et al.  Neural Networks: Tricks of the Trade , 2002, Lecture Notes in Computer Science.

[13]  Klaus-Robert Müller,et al.  Efficient BackProp , 2012, Neural Networks: Tricks of the Trade.

[14]  David J. Israel,et al.  Plans and resource‐bounded practical reasoning , 1988, Comput. Intell..

[15]  Gian Luca Foresti,et al.  Knowledge representation for ambient security , 2007, Expert Syst. J. Knowl. Eng..

[16]  Winfried Lamersdorf,et al.  Jadex: Implementing a BDI-Infrastructure for JADE Agents , 2003 .

[17]  Phillip Hallam-Baker,et al.  Web services security: soap message security , 2003 .

[18]  Javier Bajo,et al.  A Multiagent Based Strategy for Detecting Attacks in Databases in a Distributed Mode , 2008, DCAI.

[19]  Jen-Yao Chung Emerging view of service-oriented computing and applications , 2008, 2008 12th International Conference on Computer Supported Cooperative Work in Design.

[20]  Marcus Gallagher,et al.  Visualization of learning in multilayer perceptron networks using principal component analysis , 2003, IEEE Trans. Syst. Man Cybern. Part B.

[21]  Juan M. Corchado,et al.  A Reasoning Model for CBR_BDI Agents Using an Adaptable Fuzzy Inference System , 2003, CAEPIA.

[22]  Eric Pulier,et al.  Understanding Enterprise SOA , 2005 .

[23]  Ho-fung Leung,et al.  Agents in E-Commerce: State of the Art , 2002, Knowledge and Information Systems.

[24]  Mark O'Neill,et al.  Web Services Security , 2003 .

[25]  Giovanni Della-Libera,et al.  Web Services Trust Language (WS-Trust) , 2002 .

[26]  Wei-Chuen Yau,et al.  Design and Implementation of an XML Firewall , 2006, 2006 International Conference on Computational Intelligence and Security.

[27]  Ramón F. Brena,et al.  Knowledge and information distribution leveraged by intelligent agents , 2007, Knowledge and Information Systems.

[28]  Kai Rannenberg,et al.  Security and Privacy in Dynamic Environments , 2006 .

[29]  Agnar Aamodt,et al.  Case-Based Reasoning: Foundational Issues, Methodological Variations, and System Approaches , 1994, AI Commun..

[30]  Richard O. Duda,et al.  Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.

[31]  Gottfried Vossen,et al.  E-Learning as a Web Service , 2003 .