Exception handling: issues and a proposed notation
Communications of the ACM
Network Intrusion Detection: An Analyst's Handbook
Network Intrusion Detection: An Analyst's Handbook
DEXA '02 Proceedings of the 13th International Workshop on Database and Expert Systems Applications
Response to undesired events in software systems
ICSE '76 Proceedings of the 2nd international conference on Software engineering
Architecture-based Exception Handling
HICSS '01 Proceedings of the 34th Annual Hawaii International Conference on System Sciences ( HICSS-34)-Volume 9 - Volume 9
A holistic approach to service survivability
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
An Abstract Architecture for Computational Re.ection in Multi-Agent Systems
IAT '05 Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology
Solving inaccessibility in multi-agent systems by mobile middle-agents
Multiagent and Grid Systems
Hi-index | 0.00 |
We present a formal approach to conception of a dedicated security infrastructure based on the exception handling in the protected agents. Security-related exceptions are identified and handled by a dedicated reflective layer of the protected agent, or delegated to specialized intrusion management agents in the system if the local reflective layer fails to address the problem. Incidents are handled either directly, if a known remedy exists or indirectly, when an appropriate solution must be identified before response execution. The cooperation between the intrusion management agents and aggregation of their observations can make the system more resilient to misclassification than a solution based purely on signature matching.