ABSTRACT
Dynamic distributed wireless networks constitute a critical pillar for the information system. Nonetheless, the openness of these networks makes them very sensitive to external attack such as the DoS. Being able to monitor the conviction level of network components and to react in a short time once an incident is detected is a crucial challenge for their survival. In order to face those problems, research tends to evolve towards more dynamic solutions that are able to detect and validate network anomalies and to adapt themselves in order to retrieve a secure configuration. In this position paper, we complete our previous works and make the assignment of functions to agents more contextual. Our approach considers the concept of agent responsibility that we assigned dynamically to agent and that we exploit in order to analyze the level of "conviction" in the component. In this current paper, we provide an insight of the architecture without depicting the assignment mechanism neither the conviction calculation.
- Gateau, B.; Khadraoui, D.; Feltus, C., "Multi-agents system service based platform in telecommunication security incident reaction," Information Infrastructure Symposium, 2009. GIIS '09. Global, vol., no., pp. 1, 6, 23--26 June 2009. doi: 10.1109/GIIS.2009.5307083 Google ScholarDigital Library
- E. A. Brewer, R. H. Katz, E. Amir, H. Balakrishnan, Y. Chawathe, A. Fox, SS. D. Gribble, T. Hodes, G. Nguyen, V. N. Padmanabhan, M. Stemm, S. Seshan, T. Henderson, A network Architecture for Heterogeneous Mobile Computing, IEEE Personal Communications Magazine, Oct. 1998Google Scholar
- Christophe Feltus, Michaël Petit, Building a Responsibility Model Including Accountability, Capability and Commitment, ARES 2009, Fukuoka, Japan. doi: 10.1109/ARES.2009.45Google Scholar
- B. Gâteau. Modélisation et Supervision d'Institutions Multi-Agents. PhD Thesis held in cooperation with Ecole Nationale Superieure des Mines de Saint Etienne and CRP Henri Tudor, defended in Luxembourg the 26th of June 2007.Google Scholar
- B. C. Stahl, Accountability and reflective responsibility in information systems. In: C. Zielinski et al. The information society - emerging landscapes. Springer, 2006, pp. 51--68.Google Scholar
- P. Munindar Singh, Semantical Considerations on Dialectical and Practical Commitments. Proceedings of the 23rd Conference on Artificial Intelligence (AAAI). July 2008 Google ScholarDigital Library
- M. J. Smith and M. Desjardins. 2009. Learning to trust in the competence and commitment of agents. Autonomous Agents and Multi-Agent Systems 18, 1, 36--82. Google ScholarDigital Library
- J. Broersen, Mehdi Dastani, Zhisheng Huang, and Leendert W. N. van der Torre. 2002. Trust and Commitment in Dynamic Logic. EurAsia-ICT '02, Springer-Verlag, London, UK, 677--684. Google ScholarDigital Library
- N. R. Jennings, An agent-based software engineering, Agent--Oriented Software Engineering, in the Proceedings of the 9th European Workshop on Modeling Autonomous Agents in a Multi-Agent World (MAAMAW-99), Valencia, Spain.Google Scholar
- P. Ciancarini, and M. Wooldridge, Agent--Oriented Software Engineering in Procceedings of the 22nd International Conference on Software Engineering, June 2000, pp. 816--817. Google ScholarDigital Library
- M. Ouedraogo, H. Mouratidis, D. Khadraoui and E. Dubois, An agent based system to support assurance of security requirement., in proceeding of the fourth IEEE international conference on secure software integration and reliability improvement (SSIRI 2010) Google ScholarDigital Library
- C. Feltus, E. Dubois, E. Proper, I. Band, M. Petit, Enhancing the ArchiMate® Standard with a Responsibility Modeling Language for Access Rights Management, 5th ACM International Conference on Security of Information and Networks (ACM SIN 2012), Jaipur, Rajastan, India. doi<10.1145/2388576.2388577 Google ScholarDigital Library
- Jennings, N. R. (2001). An agent-based approach for building complex software systems. Communications of the ACM, 44(4), 35--41. Google ScholarDigital Library
- Schranz, Paul Steven. "VoIP security monitoring & alarm system." U.S. Patent Application 10/694, 678.Google Scholar
- Zaher, A. S., & McArthur, S. D. J. (2007, July). A multi-agent fault detection system for wind turbine defect recognition and diagnosis. In Power Tech, 2007 IEEE Lausanne (pp. 22--27). IEEE.Google Scholar
- Sadeghi, A. R., Wolf, M., Stüble, C., Asokan, N., & Ekberg, J. E. (2007). Enabling fairer digital rights management with trusted computing. In Information Security (pp. 53--70). Springer Berlin Heidelberg. Google ScholarDigital Library
- Kalinowski, J., Stuart, A., Wamsley, L., & Rastatter, M. P. (1999). Effects of monitoring condition and frequency-altered feedback on stuttering frequency. Journal of Speech, Language and Hearing Research, 42(6), 1347.Google ScholarCross Ref
- Jonathan. Blangenois, Guy. Guemkam, Christophe Feltus, Djamel Khadraoui, Organizational Security Architecture for Critical Infrastructure, 8th International Workshop on Frontiers in Availability, 8th FARES 2013, IEEE, Germany. Google ScholarDigital Library
- Djamel Khadraoui, Christophe Feltus, Critical Infrastructures Governance - Exploring SCADA Cybernetics through Architectured Policy Semantic, IEEE SMC 2013, UK.Google Scholar
- Christophe Feltus, Michaël Petit, and Eric Dubois. 2009. Strengthening employee's responsibility to enhance governance of IT: COBIT RACI chart case study. In Proceedings of the first ACM workshop on Information security governance (WISG '09). ACM, New York, NY, USA, 23--32. DOI=10.1145/1655168.1655174 http://doi.acm.org/10.1145/1655168.1655174 Google ScholarDigital Library
Index Terms
- Conviction model for incident reaction architecture monitoring based on automatic sensors alert detection
Recommendations
Video-Based Automatic Incident Detection for Smart Roads: The Outdoor Environmental Challenges Regarding False Alarms
Video-based automatic incident detection (AID) systems are increasingly being used in intelligent transportation systems (ITS). Video-based AID is a promising method of incident detection. However, the accuracy of video-based AID is heavily affected by ...
Model-Based Incident Response Playbooks
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityInevitably, all systems are vulnerable, and none are impervious to attack. Incident response is an important element in maintaining the cyber security posture of organizations. Incident response practitioners often rely on process descriptions in the ...
Incident Reaction Based on Intrusion Detections’ Alert Analysis
2018 International Conference on Applied Electronics (AE)The protection of internetworked systems by cryptographic techniques have crystallized as a fundamental aspect in establishing secure systems. Complementary, detection mechanisms for instance based on Intrusion Detection Systems has established itself as ...
Comments