New! Sign up for our free email newsletter.
Science News
from research organizations

Intelligent Programs Protect Your Computer Environment

Date:
October 19, 2008
Source:
Universidad Carlos III de Madrid
Summary:
Scientists have developed a system capable of detecting computer intrusions and automatically deciding the best response.
Share:
FULL STORY

Scientists from the Universidad Carlos III de Madrid (UC3M) have unveiled a system capable of detecting computer intrusions and automatically deciding the best response.

Intrusion detection systems (IDS) are security tools designed to monitor computer systems for suspicious events. To reduce the risk of intrusion, which is one of the threats to computer security, a team of researchers at UC3M have unveiled a multi-agent system that identifies suspicious events and autonomously determines whether or not any action should be taken. According to Professor Agustin Orfila of the Department of Informatics of the UC3M, both these are desirable features in an IDS.

At present, Spain lags behind in advancing investigations in multi-agent architectures for IDS compared to other countries. According to the investigator, the innovation behind the study is the use of deliberative agents that can adapt to the surroundings they are confronted with, and consider their past success in an independent manner to decide whether or not they should respond when facing a suspect event. This is achieved by using a “quantitative model that weighs the loss that an intrusion would provoke against the cost of taking responsive action”, Professor Orfila indicates.

In this way, the IDS multi-agent determines the best system configuration for each scenario and decides if a response is appropriate, quantifying to what extent IDS supports the calculated decision. One of the most common intrusions attacks are the “port scan attack” (searching for open ports), denial-of-service attack, achieving unrestricted access to the target computer and triying to acces a computer remotely.

Farewell to intrusions

According to the National Institute of Standards and Technologies of the United States, “Intrusion detection is the process of detecting unauthorized use of, or attack upon, a computer or network. IDSs are software or hardware systems that detect such misuse.” Professor Orfila adds that an agent should be imparted with capabilities such as reactivity, sociability, self-initiative, adaptation, mobility, with a final result of representing a person. “In this way, the IDS multi-agent architecture allows us to distribute the detection load and better co-ordinate the process, with the consequence of accomplishing a more efficient detection”, explains the professor.

Security administrators would be the ideal users for the system because “it would allow them to quantify the value that the IDS attaches to its decisions and moreover, it would indicate how to adequately tune the IDS to its environment”, states Professor Orfila. Nevertheless, in order to implement its use, he adds, the IDS would have to be adapted to the traffic of the real network, the system would require to be trained for the concrete surroundings and the functionality would have to be evaluated in this real environment.


Story Source:

Materials provided by Universidad Carlos III de Madrid. Note: Content may be edited for style and length.


Journal Reference:

  1. Orfila et al. Autonomous decision on intrusion detection with trained BDI agents. Computer Communications, 2008; 31 (9): 1803 DOI: 10.1016/j.comcom.2007.11.018

Cite This Page:

Universidad Carlos III de Madrid. "Intelligent Programs Protect Your Computer Environment." ScienceDaily. ScienceDaily, 19 October 2008. <www.sciencedaily.com/releases/2008/10/081015110845.htm>.
Universidad Carlos III de Madrid. (2008, October 19). Intelligent Programs Protect Your Computer Environment. ScienceDaily. Retrieved March 29, 2024 from www.sciencedaily.com/releases/2008/10/081015110845.htm
Universidad Carlos III de Madrid. "Intelligent Programs Protect Your Computer Environment." ScienceDaily. www.sciencedaily.com/releases/2008/10/081015110845.htm (accessed March 29, 2024).

Explore More

from ScienceDaily

RELATED STORIES