skip to main content
10.1145/2523514.2523523acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Conviction model for incident reaction architecture monitoring based on automatic sensors alert detection

Authors Info & Claims
Published:26 November 2013Publication History

ABSTRACT

Dynamic distributed wireless networks constitute a critical pillar for the information system. Nonetheless, the openness of these networks makes them very sensitive to external attack such as the DoS. Being able to monitor the conviction level of network components and to react in a short time once an incident is detected is a crucial challenge for their survival. In order to face those problems, research tends to evolve towards more dynamic solutions that are able to detect and validate network anomalies and to adapt themselves in order to retrieve a secure configuration. In this position paper, we complete our previous works and make the assignment of functions to agents more contextual. Our approach considers the concept of agent responsibility that we assigned dynamically to agent and that we exploit in order to analyze the level of "conviction" in the component. In this current paper, we provide an insight of the architecture without depicting the assignment mechanism neither the conviction calculation.

References

  1. Gateau, B.; Khadraoui, D.; Feltus, C., "Multi-agents system service based platform in telecommunication security incident reaction," Information Infrastructure Symposium, 2009. GIIS '09. Global, vol., no., pp. 1, 6, 23--26 June 2009. doi: 10.1109/GIIS.2009.5307083 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. E. A. Brewer, R. H. Katz, E. Amir, H. Balakrishnan, Y. Chawathe, A. Fox, SS. D. Gribble, T. Hodes, G. Nguyen, V. N. Padmanabhan, M. Stemm, S. Seshan, T. Henderson, A network Architecture for Heterogeneous Mobile Computing, IEEE Personal Communications Magazine, Oct. 1998Google ScholarGoogle Scholar
  3. Christophe Feltus, Michaël Petit, Building a Responsibility Model Including Accountability, Capability and Commitment, ARES 2009, Fukuoka, Japan. doi: 10.1109/ARES.2009.45Google ScholarGoogle Scholar
  4. B. Gâteau. Modélisation et Supervision d'Institutions Multi-Agents. PhD Thesis held in cooperation with Ecole Nationale Superieure des Mines de Saint Etienne and CRP Henri Tudor, defended in Luxembourg the 26th of June 2007.Google ScholarGoogle Scholar
  5. B. C. Stahl, Accountability and reflective responsibility in information systems. In: C. Zielinski et al. The information society - emerging landscapes. Springer, 2006, pp. 51--68.Google ScholarGoogle Scholar
  6. P. Munindar Singh, Semantical Considerations on Dialectical and Practical Commitments. Proceedings of the 23rd Conference on Artificial Intelligence (AAAI). July 2008 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. J. Smith and M. Desjardins. 2009. Learning to trust in the competence and commitment of agents. Autonomous Agents and Multi-Agent Systems 18, 1, 36--82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Broersen, Mehdi Dastani, Zhisheng Huang, and Leendert W. N. van der Torre. 2002. Trust and Commitment in Dynamic Logic. EurAsia-ICT '02, Springer-Verlag, London, UK, 677--684. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. N. R. Jennings, An agent-based software engineering, Agent--Oriented Software Engineering, in the Proceedings of the 9th European Workshop on Modeling Autonomous Agents in a Multi-Agent World (MAAMAW-99), Valencia, Spain.Google ScholarGoogle Scholar
  10. P. Ciancarini, and M. Wooldridge, Agent--Oriented Software Engineering in Procceedings of the 22nd International Conference on Software Engineering, June 2000, pp. 816--817. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Ouedraogo, H. Mouratidis, D. Khadraoui and E. Dubois, An agent based system to support assurance of security requirement., in proceeding of the fourth IEEE international conference on secure software integration and reliability improvement (SSIRI 2010) Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Feltus, E. Dubois, E. Proper, I. Band, M. Petit, Enhancing the ArchiMate® Standard with a Responsibility Modeling Language for Access Rights Management, 5th ACM International Conference on Security of Information and Networks (ACM SIN 2012), Jaipur, Rajastan, India. doi<10.1145/2388576.2388577 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jennings, N. R. (2001). An agent-based approach for building complex software systems. Communications of the ACM, 44(4), 35--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Schranz, Paul Steven. "VoIP security monitoring & alarm system." U.S. Patent Application 10/694, 678.Google ScholarGoogle Scholar
  15. Zaher, A. S., & McArthur, S. D. J. (2007, July). A multi-agent fault detection system for wind turbine defect recognition and diagnosis. In Power Tech, 2007 IEEE Lausanne (pp. 22--27). IEEE.Google ScholarGoogle Scholar
  16. Sadeghi, A. R., Wolf, M., Stüble, C., Asokan, N., & Ekberg, J. E. (2007). Enabling fairer digital rights management with trusted computing. In Information Security (pp. 53--70). Springer Berlin Heidelberg. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Kalinowski, J., Stuart, A., Wamsley, L., & Rastatter, M. P. (1999). Effects of monitoring condition and frequency-altered feedback on stuttering frequency. Journal of Speech, Language and Hearing Research, 42(6), 1347.Google ScholarGoogle ScholarCross RefCross Ref
  18. Jonathan. Blangenois, Guy. Guemkam, Christophe Feltus, Djamel Khadraoui, Organizational Security Architecture for Critical Infrastructure, 8th International Workshop on Frontiers in Availability, 8th FARES 2013, IEEE, Germany. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Djamel Khadraoui, Christophe Feltus, Critical Infrastructures Governance - Exploring SCADA Cybernetics through Architectured Policy Semantic, IEEE SMC 2013, UK.Google ScholarGoogle Scholar
  20. Christophe Feltus, Michaël Petit, and Eric Dubois. 2009. Strengthening employee's responsibility to enhance governance of IT: COBIT RACI chart case study. In Proceedings of the first ACM workshop on Information security governance (WISG '09). ACM, New York, NY, USA, 23--32. DOI=10.1145/1655168.1655174 http://doi.acm.org/10.1145/1655168.1655174 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Conviction model for incident reaction architecture monitoring based on automatic sensors alert detection

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
      November 2013
      483 pages
      ISBN:9781450324984
      DOI:10.1145/2523514

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 November 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate102of289submissions,35%
    • Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader