Παρακαλώ χρησιμοποιήστε αυτό το αναγνωριστικό για να παραπέμψετε ή να δημιουργήσετε σύνδεσμο προς αυτό το τεκμήριο: https://ruomo.lib.uom.gr/handle/7000/268
Πλήρης εγγραφή μεταδεδομένων
Πεδίο DCΤιμήΓλώσσα
dc.contributor.authorKaragiannis, P.-
dc.contributor.authorPaparrizos, Konstantinos-
dc.contributor.authorSamaras, Nikolaos-
dc.contributor.authorSifaleras, Angelo-
dc.date.accessioned2019-10-29T10:34:15Z-
dc.date.available2019-10-29T10:34:15Z-
dc.date.issued2004-
dc.identifier10.1109/ICTTA.2004.1307851en_US
dc.identifier.isbn0-7803-8482-2en_US
dc.identifier.urihttps://doi.org/10.1109/ICTTA.2004.1307851en_US
dc.identifier.urihttps://ruomo.lib.uom.gr/handle/7000/268-
dc.description.abstractWe present a hybrid scheme based on mobile agents, which automates the task of network monitoring and applies security policies. The scheme consists of a policy manager agent, responsible for managing security policies and responding to network attacks. This task is assisted by a variety of mobile agents running on a mobile agent platform, which help applying configurations locally. The agents developed fall into two main categories. These are situated agents and mobile agents. All agents collaborate to achieve the same goal; enhance the security of their network. Situated agents are launched via the policy manager operating on the network nodes continuously. Mobile agents are sent carrying the proper instructions to reconfigure the jeopardized hosts. The policy manager and the mobile agents are enhanced with reasoning capabilities in the form of a rule-based system. Such a system has been developed and tested with encouraging results.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectFRASCATI::Natural sciences::Computer and information sciencesen_US
dc.subjectFRASCATI::Engineering and technology::Electrical engineering, Electronic engineering, Information engineeringen_US
dc.titleEmploying mobile agents to secure local networksen_US
dc.typeBook chapteren_US
dc.contributor.departmentΤμήμα Εφαρμοσμένης Πληροφορικήςen_US
local.identifier.firstpage501en_US
local.identifier.lastpage502en_US
local.identifier.volumetitleProceedings of the International Conference on Information and Communication Technologies: From Theory to Applications (ICTTA 2004)en_US
Εμφανίζεται στις Συλλογές: Τμήμα Εφαρμοσμένης Πληροφορικής

Αρχεία σε αυτό το Τεκμήριο:
Αρχείο Περιγραφή ΜέγεθοςΜορφότυπος 
ICTTA.pdf324,99 kBAdobe PDFΠροβολή/Ανοιγμα


Τα τεκμήρια στο Αποθετήριο προστατεύονται από πνευματικά δικαιώματα, εκτός αν αναφέρεται κάτι διαφορετικό.