Agent-Based Network Protection Against Malicious Code

This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e.g. worms) and related threats. Agents are not only used as a system-integration platform, but we use modern agent approaches to trust modeling and distributed task allocation to efficiently detect and also counter the attack by automatically created and deployed filters. The ability of the system to react autonomously, without direct human supervision, is crucial in countering the fast-spreading worms, that employ efficient scanning strategies to immediately spread farther once they infect a single host in the network.

[1]  William Stallings,et al.  Data and Computer Communications , 1985 .

[2]  David G. Stork,et al.  Pattern Classification (2nd ed.) , 1999 .

[3]  David Moore,et al.  Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[4]  Angelos D. Keromytis,et al.  A holistic approach to service survivability , 2003, SSRS '03.

[5]  Jörg P. Müller,et al.  A Model for Cooperative Transportation Scheduling , 1995, ICMAS.

[6]  Jeffrey M. Bradshaw,et al.  Representing Context for Multiagent Trust Modeling , 2006, 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology.

[7]  David G. Stork,et al.  Pattern Classification , 1973 .

[8]  Reid G. Smith,et al.  The Contract Net Protocol: High-Level Communication and Control in a Distributed Problem Solver , 1980, IEEE Transactions on Computers.

[9]  Angelos D. Keromytis,et al.  Countering network worms through automatic patch generation , 2005, IEEE Security & Privacy Magazine.

[10]  William Stallings Data and Computer "Communications, 7th ed , 2004 .

[11]  Pattie Maes,et al.  Computational reflection , 1987, The Knowledge Engineering Review.

[12]  Patrick Haffner,et al.  ACAS: automated construction of application signatures , 2005, MineNet '05.

[13]  Stefan Axelsson,et al.  Intrusion Detection Systems: A Survey and Taxonomy , 2002 .

[14]  Michal Pechoucek,et al.  Trust Modeling with Context Representation and Generalized Identities , 2007, CIA.

[15]  Michal Pechoucek,et al.  Trust model for open ubiquitous agent systems , 2005, IEEE/WIC/ACM International Conference on Intelligent Agent Technology.