A survey of intrusion detection techniques
Computers and Security
Passive and active decision postponement in plan generation
New directions in AI planning
Constraint Propagation and Value Acquisition: Why we should do it Interactively
IJCAI '99 Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence
Least Commitment on Variable Binding in Presence of Incomplete Knowledge
ECP '99 Proceedings of the 5th European Conference on Planning: Recent Advances in AI Planning
Planning and Execution in Dynamic Environments
AI*IA 01 Proceedings of the 7th Congress of the Italian Association for Artificial Intelligence on Advances in Artificial Intelligence
A 25-year perspective on logic programming
Specification and verification of agent interaction using abductive reasoning
CLIMA'05 Proceedings of the 6th international conference on Computational Logic in Multi-Agent Systems
Hi-index | 0.00 |
Security management is a key issue in distributed computer systems. Resources and data need protection from unauthorized access, manipulation, and malicious intrusions that could render a system unreliable or unusable. The task's complexity calls for intelligent support systems that help system administrators detect and prevent intrusions and define appropriate countermeasures. Together with researchers at Hewlett Packard Laboratories Bristol (UK), the authors have integrated PlanNet, a constraint-based planner, in an intrusion detection system that dynamically computes plans for repairing and reconfiguring an attacked system. The integration of AI planning techniques greatly increases IDS flexibility. They have implemented the system in the constraint logic programming language Eclipse and tested it on real cases. A user-friendly, Java-based interface enables simple, direct communication with the user.