Autonomic configuration and recovery in a mobile agent-based distributed event monitoring system: Research Articles

In this paper we present a framework for building policy-based autonomic distributed agent systems. The autonomic mechanisms of configuration and recovery are supported through a distributed event processing model and a set of policy enforcement mechanisms embedded in an agent framework. Policies are event-driven rules derived from the system's functional and non-functional requirements. Agents in the network monitor the system state for policy violation conditions, generate appropriate events, and communicate them to other agents for cooperative filtering, aggregation, and handling. A set of agents perform policy enforcement actions whenever events signifying any policy violation conditions occur. Policies are defined using a specification framework based on XML. The policy enforcement agents interpret the policies given in XML. We illustrate the utility of this framework in the context of an agent-based distributed network monitoring application. We also present an experimental evaluation of our approach. Copyright © 2006 John Wiley & Sons, Ltd.

[1]  David S. Rosenblum,et al.  Design and evaluation of a wide-area event notification service , 2001, TOCS.

[2]  Peter R. Pietzuch,et al.  A Framework for Event Composition in Distributed Systems , 2003, Middleware.

[3]  Nicholas R. Jennings,et al.  Agent-based control systems: Why are they suited to engineering complex systems? , 2003 .

[4]  Pierre Sens,et al.  A fault-tolerant multi-agent framework , 2002, AAMAS '02.

[5]  George Candea,et al.  Improving availability with recursive microreboots: a soft-state system case study , 2004, Perform. Evaluation.

[6]  Victoria Ungureanu,et al.  Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems , 2000, TSEM.

[7]  Andrea Westerinen,et al.  Policy Core Information Model - Version 1 Specification , 2001, RFC.

[8]  Daniel M. Zimmerman,et al.  benefits and drawbacks of current Java mobile agent systems , 1997 .

[9]  Anand R. Tripathi,et al.  Robustness and security in a mobile-agent based network monitoring system , 2004 .

[10]  Antonio Corradi,et al.  Policy-Driven Management of Agent Systems , 2001, POLICY.

[11]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.

[12]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[13]  David D. Clark,et al.  The design philosophy of the DARPA internet protocols , 1988, SIGCOMM '88.

[14]  Anand R. Tripathi,et al.  Mobile agent programming in Ajanta , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003).

[15]  Eric A. Brewer,et al.  Cluster-based scalable network services , 1997, SOSP.

[16]  Paul Dokas,et al.  Paradigms for mobile agent based active monitoring of network systems , 2002, NOMS 2002. IEEE/IFIP Network Operations and Management Symposium. ' Management Solutions for the New Communications World'(Cat. No.02CH37327).

[17]  Michael Luck,et al.  A normative framework for agent-based systems , 2006, Comput. Math. Organ. Theory.

[18]  Marek Sergot,et al.  On the characterization of law and computer systems: the normative systems perspective , 1994 .

[19]  Emil C. Lupu,et al.  The Ponder Policy Specification Language , 2001, POLICY.

[20]  Anne-Marie Kermarrec,et al.  The many faces of publish/subscribe , 2003, CSUR.

[21]  Rajarshi Das,et al.  A multi-agent systems approach to autonomic computing , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[22]  Franco Zambonelli,et al.  Organizational Abstractions for the Analysis and Design of Multi-agent Systems , 2000, AOSE.

[23]  Jeffrey O. Kephart,et al.  An artificial intelligence perspective on autonomic computing policies , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..

[24]  Naftaly H. Minsky,et al.  On Manageability and Robustness of Open Multi-agent Systems , 2003, SELMAS.

[25]  Jennifer Widom,et al.  Deriving Production Rules for Constraint Maintainance , 1990, VLDB.

[26]  Anand R. Tripathi,et al.  Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..

[27]  Anand R. Tripathi,et al.  Design of the Ajanta system for mobile agent programming , 2002, J. Syst. Softw..

[28]  Andrea Westerinen,et al.  Terminology for Policy-Based Management , 2001, RFC.

[29]  John C. Knight,et al.  Efficient hierarchic management for reconfiguration of networked information systems , 2004, International Conference on Dependable Systems and Networks, 2004.

[30]  Jeffrey O. Kephart,et al.  An architectural approach to autonomic computing , 2004 .

[31]  NICHOLAS R. JENNINGS,et al.  An agent-based approach for building complex software systems , 2001, CACM.