Open Access Open Access  Restricted Access Subscription or Fee Access

Intelligent and Pervasive Supervising Platform for Information System Security Based on Multi-Agent Systems


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v10i1.4699

Abstract


As the development of technology, the mobile phone world also has developed very quickly. Mobile communication and services, over emerging wireless technologies, provide anyone, anytime and anywhere access. Moreover, the intelligence is now often embedded into modern applications, such as surveillance and supervising systems. This work presents an intelligent and a pervasive supervising platform for information system (IS) security based on multi-agent systems (MAS) which detects and classifies malware events that occurs on software and hardware components and sends real time notification to smart phone users. The proposed platform is formed by two components: The first one consists of a Central Software Component (CSC); the supervisor application that manages devices and evaluates logs and alarms of the supervised components. The second one consists of an Embedded Software Component (ESC) on the Mobile Device (MD) with an ANDROID OS.  In our platform, we have implemented agents on ESC using JADE-LEAP android, note that the ESC is targeted to smart phones and tablet that run the operating system Android, JADE API on CSC and the communication between these two components is performed using the Secure Socket Layer (SSL) protocol implemented using the JADE-S plug-in.
Copyright © 2015 Praise Worthy Prize - All rights reserved.

Keywords


Multi-Agent Systems; JADE-LEAP Android; JADE-S; Smart Phone; Network Security; ANDROID OS; Real-Time Notification Alert; SSL

Full Text:

PDF


References


R.Abidar, K.Moummadi, H.Medromi, 2011. “Mobile device and Multi agent systems An Implemented platform of real time data communication and synchronization“, ICMCS’11, ouarzazate, morrocco
http://dx.doi.org/10.1109/icmcs.2011.5945595

K.Moummadi, R.Abidar, H.Medromi, Distributed Resource Allocation: Generic Model and Solution Based on Constraint Programming and Multi-Agent System for Machine to Machine Services, Volume 4, Issue 2.49-62, April-June 2012 . IGI Global. ISSN: 1937-9412, E-ISSN: 1937-9404.
http://dx.doi.org/10.4018/jmcmc.2012040104

Moummadi, K., Abidar, R., Moutaouakkil, F., Medromi, H., Network alert management based on multi agent systems for surveillance and supervising software and hardware components, (2014) International Review on Computers and Software (IRECOS), 9 (6), pp. 1074-1081.

Pradeep K. Murukannaiah, Munindar P. Singh: Xipho: Extending Tropos to Engineer Context-Aware Personal Agents, Proceedings of the 13 th Inter-national Conferenceon Autonomous Agents and Multiagent Systems (AAMAS 2014)

Crystaliz, Inc., General Magic, Inc., GMD Focus, and I. Coorp. Mobile Agent Facility Specification. Technical report, OMG, 1997.

Michael Luck, Peter McBurney, Onn Shehory, Steve Willmott and the AgentLink Community: “Agent Technology: Computing as Interaction: A Roadmap for Agent Based Computing”, AgentLink III, September 2005

J. Ferber. Multi-Agent Systems: An Introduction to Artificial Intelligence. Addison Wesley Publishing Company, 1999;

N. J. Nilsson. Artificial Intelligence: A new synthesis. Morgan Kaufmann 1998.
http://dx.doi.org/10.1016/b978-0-08-049945-1.50034-4

S. J. Russell and P. Norvig. Artificial Intelligence: A modern approach. Prentice Hall 2002.
http://dx.doi.org/10.1017/s0269888900007724

G. Weiss, editor. Multi-agent Systems: A Modern Approach to Distributed Artificial Intelligence. MIT Press, 1999.

M. Wooldridge. An Introduction to MultiAgent Systems. John Wiley & Sons 2001.

Kavita Sharma, Android: The Possibilities are Endless, IJARCS, Volume 2,N°1, Jan-FEB 2011

F. S. Hsieh. Model and control of holonic manufacturing systems based on fusion of contract nets and Petri nets. Automatica vol. 40, pp. 51-57, 2004.
http://dx.doi.org/10.1016/j.automatica.2003.07.008

F. Bergenti, A. Poggi, LEAP: a FIPA platform for handheld and mobile devices, in: Proceedings of the 8th International Workshop on Agent Theories, Architectures and Languages (ATAL-2001), Seattle, WA, USA, August 2001.

F. Bellifemine, G. Rimassa, A. Poggi, JADE—a FIPA compliant agent framework, in:Proceedings of the 4th International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agents, London, 1999.
http://dx.doi.org/10.1145/375735.376120

S. Tarkoma, M. Laukkanen, Supporting software agents on small devices, in: Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS-2002), Bologna, Italy, July 2002.
http://dx.doi.org/10.1145/544862.544877

Foundation for Intelligent Physical Agents (FIPA). Available from: .

R.L. Albuquerque et al., KSACI: A handheld device infrastructure for agent communication, in: Proceedings of the ATAL 2001 Conference, Seattle, USA, 2001.

D. Johansen et al., A tacoma retrospective, Software Practice and Experience 32 (6) (2002) 605–619.
http://dx.doi.org/10.1002/spe.451

C. Ba¨umer et al., Grasshopper—a universal agent platform based on OMG MASIF and FIPA standards, in: Proceedings of the First International Workshop on Mobile Agents for Telecommunication Applications (MATA_99), Ottawa, Canada, October 1999, pp. 1–18.

E. Ferreira, et al., Implementing mobile agent design patterns in the JADE framework, Special Issue on JADE of the TILAB Journal EXP (2003).

Agostino Poggi, Giovanni Rimassa, Michele Tomaiuolo, Multi-user and security support for multi-agent systems, Proceedings of WOA 2001 Workshop, Modena, Italy, Sep 2001.

A. Moreno, D. Sanchez, D. Isern, Security measures in a medical multi-agent system, in: Frontiers in Artificial Intelligence and Applications, IOS Press, 2003, pp. 244–255.

M-P. Huget. Agent UML Class Diagrams Revisited. In Proceedings of Agent Technology and Software Engineering (AgeS), Germany, Octobre 2002

Sayouti, H. Medromi, F. Elmariami, A. Belfqih, “Multi-agent Systems – Modeling, Programming and Application”, International Journal of Applied Information Systems – ISSN: 2249-0868 Vol.4- N°4, April 2013
http://dx.doi.org/10.5120/ijais13-450918

P. Giorgini, F. Massacci, N. Zannone, Security and trust requirements engineering,Proc. of Foundations of Security Analysis and Design III—Tutorial Lectures, LNCS 3655, Springer-Verlag, 2005, pp. 237–272, GmbH.;
http://dx.doi.org/10.1007/11554578_8

Moutaouakkil, F., Sayouti, A., Medromi, H., Telerobotic on internet case study: Mobile robot, (2010) International Review on Computers and Software (IRECOS), 5 (4), pp. 390-395.

K.Moummadi, R.Abidar, H.Medromi, 2012 “Implementation and integration of an intrusion detection system and an agricultural decision support system based on multi-agent system “, ICCS’12, Agadir, morocco
http://dx.doi.org/10.1109/icmcs.2011.5945678

K.Moummadi, R.Abidar, H.Medromi, 2011. “Generic model based on constraint programming and multi‐agent system for M2M services and agricultural decision support“, ICMCS’11 , ouarzazate, morocco
http://dx.doi.org/10.1109/icmcs.2011.5945678

“Go Gulf Blog” Available: http://www.go-gulf.com/blog/smartphone/ Accessed 06/05/2013.

Open Mobile Alliance Official Site.


Refbacks




Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize