A novel defense model for dynamic topology network based on mobile agent

It is common for the network topology to change during its operation, which demands that the network defense system adapt itself for the current topology. Aiming at such need, this paper provides a novel defense model for the dynamic topology network, which includes three modules: network topology discovery, adaptive agents re-configuration mechanism and active defense. The model is based on mobile agent technology, and contains two kinds of agents: topology discovery agent and defense agent. The model uses topology discovery agents to actively probe the current network topology and encodes it. Then the adaptive re-configuration mechanism of the model implements the distribution and migration of the defense agents according to the current topology. Thus, the re-configured defense agents provide active defense for the network. The whole model emerges with the Markov property, which is also analyzed in the paper. q 2004 Elsevier B.V. All rights reserved.

[1]  C. Shatz The developing brain. , 1992, Scientific American.

[2]  Eugene H. Spafford,et al.  An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[3]  José Aguilar,et al.  A General Ant Colony Model to solve Combinatorial Optimization Problems , 2001, Rev. Colomb. de Computación.

[4]  T. Karygiannis,et al.  MOBILE AGENTS IN INTRUSION DETECTION AND RESPONSE , .

[5]  J. Doob Stochastic processes , 1953 .

[6]  M. Asaka,et al.  A method of tracing intruders by use of mobile agents , 1999 .

[7]  Sheldon M. Ross,et al.  Stochastic Processes , 2018, Gauge Integral Structures for Stochastic Calculus and Quantum Electrodynamics.

[8]  Dan Boneh,et al.  On genetic algorithms , 1995, COLT '95.

[9]  Salvatore J. Stolfo,et al.  A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[10]  Marco Dorigo,et al.  Distributed Optimization by Ant Colonies , 1992 .

[11]  Thomas R. Gross,et al.  Topology discovery for large ethernet networks , 2001, SIGCOMM 2001.

[12]  Eugene H. Spafford,et al.  Defending a Computer System Using Autonomous Agents , 1995 .

[13]  Shiyong Zhang,et al.  A Topology-Adapted Network Defense Model Based on Mobile Agent , 2004, GCC Workshops.

[14]  Udo W. Pooch,et al.  Adaptive agent-based intrusion response , 2001 .