A security system implementation using software agents

This paper presents multi-agent system architecture to protect hosts and users. The main objective of this system is to provide a secure environment to users at two levels. At the first level, the user is authenticated and authorised. At the second level, the messages are encrypted, decrypted, signed and verified. The system architecture is comprised of three tiers. At the front end of the system, interface agents interact with the users to fulfil their interests. At the middle tier of the system, service guard agents act as the system safeguard by authenticating and authorising users so that they can access the system and use the service resources appropriately. At the back end of the system, service provider agents offer different security services to different users. This paper provides the system and the agents' design as well as the implementations of the agents that make them capable of working together to provide a secure environment. A prototype of the system is implemented to demonstrate how the agents communicate and coordinate their activities to provide a secure environment.

[1]  Stuart McClure,et al.  Hacking Exposed: Network Security Secrets and Solutions, Fourth Edition , 2001 .

[2]  Timothy W. Finin,et al.  Developing Secure Agent Systems Using Delegation Based Trust Management , 2002, AAMAS 2002.

[3]  Aladdin Ayesh,et al.  Framework of multi-agents internet security system , 2000 .

[4]  George Kurtz,et al.  Hacking Exposed , 2005 .

[5]  José M. Vidal,et al.  Multiagent network security system using FIPA-OS , 2002, Proceedings IEEE SoutheastCon 2002 (Cat. No.02CH37283).

[6]  William J. Buchanan,et al.  An intelligent agent security intrusion system , 2002, Proceedings Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems.

[7]  Chin-Chen Chang,et al.  A dynamic key-lock-pair access control scheme , 1991, Comput. Secur..

[8]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[9]  Mohamed S. Kamel,et al.  Agent-Based System Architecture for Dynamic and Open Environments , 2003, Int. J. Inf. Technol. Decis. Mak..

[10]  Sajjad Haider,et al.  A multi-technique approach for user identification through keystroke dynamics , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[11]  George Cybenko,et al.  D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.

[12]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[13]  Stuart McClure,et al.  Hacking Exposed; Network Security Secrets and Solutions , 1999 .