Autonomous Malicious Activity Inspector - AMAI

نویسندگان

  • Umar Manzoor
  • Samia Nefti-Meziani
  • Yacine Rezgui
چکیده

Computer networks today are far more complex and managing such networks is not more then a job of an expert. Monitoring systems helps network administrator in monitoring and protecting the network by not allowing the users to run illegal application or changing the configuration of the network node. In this paper, we have proposed Autonomous Malicious Activity Inspector – AMAI which uses ontology based knowledge base to predict unknown illegal applications based on known illegal application behaviors. AMAI is an Intelligent Multi Agent System used to detect known and unknown malicious activities carried out by the users over the network. We have compared ABSAMN and AMAI concurrently at the university campus having seven labs equipped with 20 to 300 number of PCs in various labs; results shows AMAI outperform ABSAMN in every aspect.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Interactions of Pose Estimation and Online Dynamic Modeling for a Small Inspector Spacecraft

Close-proximity operations between spacecraft allow for docking and inspection of a target vehicle. Very small spacecraft are well-suited for proximity activities and are of growing interest in the aerospace community. However, due to size and power constraints, small vehicles cannot carry traditional precision navigation systems and generally have noisy sensor and actuator options. This paper ...

متن کامل

SPHERES interact - Human-machine interaction aboard the International Space Station

The deployment of space robots for servicing and maintenance operations, which are teleoperated from ground, is a valuable addition to existing autonomous systems since it will provide flexibility and robustness in mission operations. In this connection, not only robotic manipulators are of great use but also free-flying inspector satellites supporting the operations through additional feedback...

متن کامل

Re-wiring Activity of Malicious Networks

This paper studies the AS-level re-wiring dynamics (changes in the connectivity) of malicious networks. Anecdotal evidence suggests that some malicious ASes that are primarily involved in nefarious activities on the Internet, were sequentially de-peered by providers before their final cut-off (as occurred in the well-publicized cases of Atrivo/Intercage). We present the first systematic study o...

متن کامل

Efficient and Distributed Network Model for P2p Systems

ABSTRACT Peer-to-peer networks are networks composed of heterogeneous and autonomous peers that cooperate with each other in a decentralized manner. All peers are both users and providers of resources and can access each other directly without intermediary agents. In the proposed system, we introduce a Self-Organizing Trust model (SORT) that aims to decrease malicious activity in a P2P system b...

متن کامل

Distributed Privacy Preserving Information Sharing

In this paper, we address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. Semi-honest behavior has been widely adopted as the model for adversarial threats. However, it substantially underestimates the capability of adversaries in reality. In this paper, we consider a threat space containing more powerful a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010