Jinqiao Yu, Y. Reddy, S. Selliah, K. Srinivas, S. Reddy, V. Bharadwaj
{"title":"TRINETR: an intrusion detection alert management systems","authors":"Jinqiao Yu, Y. Reddy, S. Selliah, K. Srinivas, S. Reddy, V. Bharadwaj","doi":"10.1109/ENABL.2004.76","DOIUrl":"https://doi.org/10.1109/ENABL.2004.76","url":null,"abstract":"In response to the daunting threats of cyber attacks, a promising approach is computer and network forensics. Intrusion detection system is an indispensable part of computer and network forensics. It is deployed to monitor network and host activities including dataflows and information accesses etc. But current intrusion detection products presents many flaws including alert flooding, too many false alerts and isolated alerts etc. We describe an ongoing project to develop an intrusion alert management system $TRINETR. We present a collaborative architecture design for multiple intrusion detection systems to work together to detect real-time network intrusions. The architecture is composed of three parts: alert aggregation, knowledge-based alert evaluation and alert correlation. The architecture is aimed at reducing the alert overload by aggregating alerts from multiple sensors to generate condensed views, reducing false positives by integrating network and host system information into alert evaluation process and correlating events based on logical relations to generate global and synthesized alert report. The first two parts of the architecture have been implemented and the implementation results are presented.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121554602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systemions: a model for open agents","authors":"E. Sanchis","doi":"10.1109/ENABL.2004.61","DOIUrl":"https://doi.org/10.1109/ENABL.2004.61","url":null,"abstract":"The agent paradigm plays a central role in the modelling and the design of modern computer systems. Just like the systems -which they implement software agents have to be both controllable in their complexity and able to acquire new behaviours. This paper presents a model of open agent stemming from the systemic metaphor which has an architecture capable of integrating external behaviours into the agent, providing the entity with a physical opening on its environment.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122660654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security risks: management and mitigation in the software life cycle","authors":"D. Gilliam","doi":"10.1109/ENABL.2004.55","DOIUrl":"https://doi.org/10.1109/ENABL.2004.55","url":null,"abstract":"A formal approach to managing and mitigating security risks in the software life cycle is requisite to developing software that has a higher degree of assurance that it is free of security defects, which pose risk to the computing environment and the organization. Due to its criticality, security should be integrated as a formal approach in the software life cycle. Both a software security checklist and assessment tools should be incorporated into this life cycle process and integrated with a security risk assessment and mitigation tool. The current research at JPL addresses these areas through the development of a Software Security Assessment Instrument (SSA1) and integrating it with a Defect Detection and Prevention (DDP) risk management tool.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126979577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Pazienza, M. Pennacchiotti, Fabio Massimo Zanzotto
{"title":"Modelling semantic grid knowledge embedded in documents","authors":"M. Pazienza, M. Pennacchiotti, Fabio Massimo Zanzotto","doi":"10.1109/ENABL.2004.45","DOIUrl":"https://doi.org/10.1109/ENABL.2004.45","url":null,"abstract":"The growing success of grid technologies inside scientific communities has produced an increasing need for the development of tools and methodologies able to support knowledge sharing and handling among people, built upon the grid. This \"semantic\" infrastructure is becoming to be referred as semantic grid. In this paper we propose an original approach to the development of a system for the creation of the knowledge layer of the semantic grid, that is, the layer which carries the informative content that the community shares. Using well-assessed natural language processing and machine learning methodologies and techniques, our goal is to acquire and organize the information stored in the grid, where this information is supposed to be represented in unstructured documents. Our intent is to extract and shape knowledge in syntactic patterns and organize them into a hierarchy of relational concepts, whose goal is to improve the process of knowledge retrieval and maintenance.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116499336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaborator - enabling enterprise collaboration through agents","authors":"F. Bergenti, M. Mari, M. Garijo","doi":"10.1109/ENABL.2004.19","DOIUrl":"https://doi.org/10.1109/ENABL.2004.19","url":null,"abstract":"This paper presents a particular aspect of the architecture of Collaborator, a software system that provides enterprise users with a shared workspace to support the activities of virtual teams. Collaborator exploits the seamless integration of everyday Web technologies with agents to promote flexibility in the interaction between users. In this paper we concentrate on the agent subsystem of Collaborator, and we show the architecture of this multiagent system and the functionality that it provides. In particular, we present the roles that agents play in the overall system (personal agents and session manager agent), and we detail on how personal agents are used to (i) manage the calendar of users; (ii) negotiate and classify meetings; and (iii) learn the preferences of users.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121278397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing an agent-based RBAC system for dynamic security policy","authors":"W. Yamazaki, H. Hiraishi, F. Mizoguchi","doi":"10.1109/ENABL.2004.22","DOIUrl":"https://doi.org/10.1109/ENABL.2004.22","url":null,"abstract":"Most practical applications have dynamic attributes, but conventional access control mechanisms have not addressed the problem sufficiently. We discuss how to realize an access control system that enables us to manage dynamic security policies. Our proposed method is based on role-based access control (RBAC), and the agent decides access rights dynamically for the abstract role, which is defined by the role administrator statically using context-enabled rules and an inference engine. By defining rules using declarative representation (logic programming style), bidirectional queries can be realized for user-role-permission relationships. We demonstrate the usefulness of our proposed system by presenting our project management application and its access control system.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"575 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123128863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge-based services for next-generation grids","authors":"M. Cannataro","doi":"10.1109/ENABL.2004.41","DOIUrl":"https://doi.org/10.1109/ENABL.2004.41","url":null,"abstract":"To be effectively adopted in different application domains, next-generation grids need to face some emerging issues in scientific and commercial applications and in the way they use grids: an overwhelming availability of data, an increasing complexity and distribution of applications, an increasing heterogeneity of grid users and applications. Moreover, the amount of grid usage data increases whenever new functions are added to the grid middleware. To face such issues next-generation grids need to adopt knowledge based functionalities, for both applications support and system management. The paper introduces requirements of next-generation grids and describes some emerging services and simple cases study showing how such services could be employed.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128390856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grid programming for distributed remote robot control","authors":"Fabrice Sabatier, A. D. Vivo, S. Vialle","doi":"10.1109/ENABL.2004.35","DOIUrl":"https://doi.org/10.1109/ENABL.2004.35","url":null,"abstract":"A computational grid can be an interesting solution for distributed remote robot control. It can provide computational resources when the usual ones are too loaded or not powerful enough. It can support fault tolerance allowing redundant computations. It can make possible the robotic system sharing with remote partners. We designed a grid architecture across Internet, including resources from two laboratories, one in Italy and one in France. It is based on the DIET GridRPC environment and supports distributed remote redundant control of an autonomous robot. This paper focuses on high-level grid services and on a specific GridRPC library we designed for improving the robotic application development.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131481738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Scerri, A. Farinelli, Steven Okamoto, Milind Tambe
{"title":"Token approach for role allocation in extreme teams: analysis and experimental evaluation","authors":"P. Scerri, A. Farinelli, Steven Okamoto, Milind Tambe","doi":"10.1109/ENABL.2004.67","DOIUrl":"https://doi.org/10.1109/ENABL.2004.67","url":null,"abstract":"Open computational systems comprise physical entities coordinating their activities in dynamic environments. Many exciting applications require a large number of such entities to achieve team coordination in complex missions execution. To meet the fundamental challenge of role allocation in such extreme teams, we propose an algorithm called LA-DCOP, that overcomes the limitations of previous algorithms by incorporating three key ideas. First, we represent the role allocation problem as a distributed constraint optimization problem and use tokens representing roles to minimize constraint violations. Second, we use probabilistic information about the team to guide the search quickly towards good solutions. Third, we designed the algorithm to manage constrained roles. We show that LA-DCOP not only meets our requirements in extreme teams, but also compares favorably against previous role allocation algorithms. LA-DCOP has allowed an order of magnitude scale-up in extreme teams, with role allocation in a fully distributed proxy-based teams with up to 200 members.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122471301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Andreozzi, D. Montesi, P. Ciancarini, Rocco Moretti
{"title":"Towards a model for quality of Web and grid services","authors":"S. Andreozzi, D. Montesi, P. Ciancarini, Rocco Moretti","doi":"10.1109/ENABL.2004.70","DOIUrl":"https://doi.org/10.1109/ENABL.2004.70","url":null,"abstract":"The service oriented model is the emerging approach adopted by Web and grid services where parties act as service requestors and service providers. An aspect to consider is improving machine-to-machine interaction by enabling an automatic evaluation and selection of available services with respect to a set of expectations. This paper presents a model for the rigorous representation of service characteristics, for the association of each of their possible values with the requester satisfaction, and for the aggregation of the single satisfactions in an overall score using a particular logic. The proposed model is exemplified in the area of grid computing.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129032915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}