Research on System Logs Collection and Analysis Model of the Network and Information Security System by Using Multi-agent Technology

Author(s):  
Shi Shengyan ◽  
Shen Xiaoliu ◽  
Zhao Jianbao ◽  
Ma Xinke
2011 ◽  
Vol 460-461 ◽  
pp. 433-438 ◽  
Author(s):  
Peng Wang

With the growing population of using public network, network intrusion events happened more frequently. Aim to the drawbacks of traditional information security methods, the multi-agent system model was proved to be very promising. This paper proposes a dynamic distributed information security system based on multi-agent that dynamically integrates all distributed information security facilities to achieve efficiently collaborative information security. In order to validate this proposed approach, the authors give the material experiment test in the end of this paper. The final experiment result suggests that, this proposed approach is feasible, correct and valid.


Author(s):  
М.А. Куцакин ◽  
А.Н. Лапко ◽  
О.Ю. Миронов ◽  
О.В. Карамыхова

В статье предложена модель безопасности информационной системы с использованием многоагентной технологии. Проанализированы основные проблемы информационной безопасности корпоративных систем, представлены направления для реализации механизмов аутентификации пользователя. The article proposes a security model for an information system using multi-agent technology. The main problems of information security of corporate systems are analyzed, directions for the implementation of user authentication mechanisms are presented.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2021 ◽  
pp. 1-10
Author(s):  
Xiangyong Li

In order to improve the effect of remote ideological and political education, this paper builds a Web ideological and political education system based on Agent technology, and adopts a three-layer abstract system architecture including Web service layer, Agent processing layer and service process layer. Moreover, based on this architecture foundation, this paper proposes an Agent-based Web service integration structure, and illustrates the overall execution process of the system through the execution process of the system integration structure. Then, this paper proposes the organization structure of multi-agent in the Agent processing layer and the organization structure of service process in the service process layer of the system. In addition, this paper uses multi-agent system design to ensure the efficient operation of the entire system, and combines algorithms to implement system resource recommendation modules and practical teaching functions. Finally, this paper designs a control experiment to test the performance of the distance ideological and political education system constructed in this paper. The research results show that the system constructed in this paper has certain practical effects.


Sign in / Sign up

Export Citation Format

Share Document