IEEE Transactions on Software Engineering
Proceedings of the 21st international conference on Software engineering
Bro: a system for detecting network intruders in real-time
Computer Networks: The International Journal of Computer and Telecommunications Networking
NetSTAT: a network-based intrusion detection system
Journal of Computer Security
Security in the Ajanta mobile agent system
Software—Practice & Experience
An Open Secure Mobile Agent Framework for SystemsManagement
Journal of Network and Systems Management
IEEE Internet Computing
Designing a Web of Highly-Configurable Intrusion Detection Sensors
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Mobile Agents for Aggregation of Network Management Data
ASAMA '99 Proceedings of the First International Symposium on Agent Systems and Applications Third International Symposium on Mobile Agents
Mobile Agent Programming in Ajanta
ICDCS '99 Proceedings of the 19th IEEE International Conference on Distributed Computing Systems
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
SNMP and SNMPv2: the infrastructure for network management
IEEE Communications Magazine
Cooperating security managers: a peer-based intrusion detection system
IEEE Network: The Magazine of Global Internetworking
Policy-driven configuration and management of agent based distributed systems
SELMAS '05 Proceedings of the fourth international workshop on Software engineering for large-scale multi-agent systems
Policy-Driven configuration and management of agent based distributed systems
Software Engineering for Multi-Agent Systems IV
Hi-index | 0.00 |
We have developed a mobile-agent based network monitoring system. In this system, multiple agents coordinate with each other to collectively perform network monitoring. This paper deals with the coordination of multiple agents to achieve monitoring functions and failed component recovery. We also address the security needs of our monitoring system, i.e. types of attacks that could be launched on the system, and our solutions to thwart them. Finally, we present our experiences with the system and the resource overhead imposed by it.