Παρακαλώ χρησιμοποιήστε αυτό το αναγνωριστικό για να παραπέμψετε ή να δημιουργήσετε σύνδεσμο προς αυτό το τεκμήριο:
https://ruomo.lib.uom.gr/handle/7000/268
Πλήρης εγγραφή μεταδεδομένων
Πεδίο DC | Τιμή | Γλώσσα |
---|---|---|
dc.contributor.author | Karagiannis, P. | - |
dc.contributor.author | Paparrizos, Konstantinos | - |
dc.contributor.author | Samaras, Nikolaos | - |
dc.contributor.author | Sifaleras, Angelo | - |
dc.date.accessioned | 2019-10-29T10:34:15Z | - |
dc.date.available | 2019-10-29T10:34:15Z | - |
dc.date.issued | 2004 | - |
dc.identifier | 10.1109/ICTTA.2004.1307851 | en_US |
dc.identifier.isbn | 0-7803-8482-2 | en_US |
dc.identifier.uri | https://doi.org/10.1109/ICTTA.2004.1307851 | en_US |
dc.identifier.uri | https://ruomo.lib.uom.gr/handle/7000/268 | - |
dc.description.abstract | We present a hybrid scheme based on mobile agents, which automates the task of network monitoring and applies security policies. The scheme consists of a policy manager agent, responsible for managing security policies and responding to network attacks. This task is assisted by a variety of mobile agents running on a mobile agent platform, which help applying configurations locally. The agents developed fall into two main categories. These are situated agents and mobile agents. All agents collaborate to achieve the same goal; enhance the security of their network. Situated agents are launched via the policy manager operating on the network nodes continuously. Mobile agents are sent carrying the proper instructions to reconfigure the jeopardized hosts. The policy manager and the mobile agents are enhanced with reasoning capabilities in the form of a rule-based system. Such a system has been developed and tested with encouraging results. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | FRASCATI::Natural sciences::Computer and information sciences | en_US |
dc.subject | FRASCATI::Engineering and technology::Electrical engineering, Electronic engineering, Information engineering | en_US |
dc.title | Employing mobile agents to secure local networks | en_US |
dc.type | Book chapter | en_US |
dc.contributor.department | Τμήμα Εφαρμοσμένης Πληροφορικής | en_US |
local.identifier.firstpage | 501 | en_US |
local.identifier.lastpage | 502 | en_US |
local.identifier.volumetitle | Proceedings of the International Conference on Information and Communication Technologies: From Theory to Applications (ICTTA 2004) | en_US |
Εμφανίζεται στις Συλλογές: | Τμήμα Εφαρμοσμένης Πληροφορικής |
Αρχεία σε αυτό το Τεκμήριο:
Αρχείο | Περιγραφή | Μέγεθος | Μορφότυπος | |
---|---|---|---|---|
ICTTA.pdf | 324,99 kB | Adobe PDF | Προβολή/Ανοιγμα |
Τα τεκμήρια στο Αποθετήριο προστατεύονται από πνευματικά δικαιώματα, εκτός αν αναφέρεται κάτι διαφορετικό.