Practical Unix and Internet security (2nd ed.)
Practical Unix and Internet security (2nd ed.)
JAM: a BDI-theoretic mobile agent architecture
Proceedings of the third annual conference on Autonomous Agents
Multiagent systems: a modern approach to distributed artificial intelligence
Multiagent systems: a modern approach to distributed artificial intelligence
UNIX shells by example (2nd ed.)
UNIX shells by example (2nd ed.)
Knowledge representation: logical, philosophical and computational foundations
Knowledge representation: logical, philosophical and computational foundations
SSH, The Secure Shell: The Definitive Guide
SSH, The Secure Shell: The Definitive Guide
Hacking Exposed: Network Security Secrets and Solutions,Third Edition
Hacking Exposed: Network Security Secrets and Solutions,Third Edition
Managing NFS and NIS
LISA '98 Proceedings of the 12th Conference on Systems Administration
Reasoning with cause and effect
IJCAI'99 Proceedings of the 16th international joint conference on Artificial intelligence - Volume 2
Hi-index | 0.00 |
Organizations have evolved to the stage where critical data management and protection are intimately linked to revenues. Error margins become smaller as information importance becomes greater. Security compromises cause considerable credibility loss and frustration. In this paper, we address both proactively and retrospectively security related problems for Unix-based systems. We have designed and built a software infrastructure, which handles security issues by autonomous intelligent agents automatically and dynamically with none or minimal service interruptions. Our software has been implemented and used for more than a year as part of the production environment of a mobile phone operator and Internet provider. The evaluation results over this period have shown that autonomous intelligent agents handling security can reduce dramatically downtime caused by security related incidents.