{"title":"计算机网络安全软件代理","authors":"Igor Kotenko, R. Leszczyna","doi":"10.3233/978-1-60750-818-2-260","DOIUrl":null,"url":null,"abstract":"The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent Malware Simulator (MAlSim). The chapter sketches the above agent-based systems and analyses advantages of applying multi-agent technologies in computer network security area.","PeriodicalId":193688,"journal":{"name":"Software Agents, Agent Systems and Their Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Software Agents for Computer Network Security\",\"authors\":\"Igor Kotenko, R. Leszczyna\",\"doi\":\"10.3233/978-1-60750-818-2-260\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent Malware Simulator (MAlSim). The chapter sketches the above agent-based systems and analyses advantages of applying multi-agent technologies in computer network security area.\",\"PeriodicalId\":193688,\"journal\":{\"name\":\"Software Agents, Agent Systems and Their Applications\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Software Agents, Agent Systems and Their Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3233/978-1-60750-818-2-260\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Software Agents, Agent Systems and Their Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/978-1-60750-818-2-260","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent Malware Simulator (MAlSim). The chapter sketches the above agent-based systems and analyses advantages of applying multi-agent technologies in computer network security area.