Detecting intrusions in agent system by means of exception handling

Eric Platon*, Martin Rehak, Nicolas Sabouret, Michal Prchoucek, Shinichi Honiden

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We present a formal approach to conception of a dedicated security infrastructure based on the exception handling in the protected agents. Security-related exceptions are identified and handled by a dedicated reflective layer of the protected agent, or delegated to specialized intrusion management agents in the system if the local reflective layer fails to address the problem. Incidents are handled either directly, if a known remedy exists or indirectly, when an appropriate solution must be identified before response execution. The cooperation between the intrusion management agents and aggregation of their observations can make the system more resilient to misclassification than a solution based purely on signature matching.

Original languageEnglish
Title of host publicationHolonic and Multi-Agent Systems for Manufacturing - 3rd International Conference on Industrial Applications of Holonic and Multi-Agent Systems, HoloMAS 2007, Proceedings
Pages161-172
Number of pages12
Publication statusPublished - 2007 Dec 24
Externally publishedYes
Event3rd International Conference on Industrial Applications of Holonic and Multi-Agent Systems, HoloMAS 2007 - Regensburg, Germany
Duration: 2007 Sept 32007 Sept 5

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4659 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other3rd International Conference on Industrial Applications of Holonic and Multi-Agent Systems, HoloMAS 2007
Country/TerritoryGermany
CityRegensburg
Period07/9/307/9/5

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Detecting intrusions in agent system by means of exception handling'. Together they form a unique fingerprint.

Cite this