Please use this identifier to cite or link to this item: https://ruomo.lib.uom.gr/handle/7000/268
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKaragiannis, P.-
dc.contributor.authorPaparrizos, Konstantinos-
dc.contributor.authorSamaras, Nikolaos-
dc.contributor.authorSifaleras, Angelo-
dc.date.accessioned2019-10-29T10:34:15Z-
dc.date.available2019-10-29T10:34:15Z-
dc.date.issued2004-
dc.identifier10.1109/ICTTA.2004.1307851en_US
dc.identifier.isbn0-7803-8482-2en_US
dc.identifier.urihttps://doi.org/10.1109/ICTTA.2004.1307851en_US
dc.identifier.urihttps://ruomo.lib.uom.gr/handle/7000/268-
dc.description.abstractWe present a hybrid scheme based on mobile agents, which automates the task of network monitoring and applies security policies. The scheme consists of a policy manager agent, responsible for managing security policies and responding to network attacks. This task is assisted by a variety of mobile agents running on a mobile agent platform, which help applying configurations locally. The agents developed fall into two main categories. These are situated agents and mobile agents. All agents collaborate to achieve the same goal; enhance the security of their network. Situated agents are launched via the policy manager operating on the network nodes continuously. Mobile agents are sent carrying the proper instructions to reconfigure the jeopardized hosts. The policy manager and the mobile agents are enhanced with reasoning capabilities in the form of a rule-based system. Such a system has been developed and tested with encouraging results.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectFRASCATI::Natural sciences::Computer and information sciencesen_US
dc.subjectFRASCATI::Engineering and technology::Electrical engineering, Electronic engineering, Information engineeringen_US
dc.titleEmploying mobile agents to secure local networksen_US
dc.typeBook chapteren_US
dc.contributor.departmentΤμήμα Εφαρμοσμένης Πληροφορικήςen_US
local.identifier.firstpage501en_US
local.identifier.lastpage502en_US
local.identifier.volumetitleProceedings of the International Conference on Information and Communication Technologies: From Theory to Applications (ICTTA 2004)en_US
Appears in Collections:Department of Applied Informatics

Files in This Item:
File Description SizeFormat 
ICTTA.pdf324,99 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.