Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2019

01.12.2019

Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures

verfasst von: N. A. Grusho

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2019

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract–

The analysis of multiagent systems, the features of their application, architectures, and data storage methods is presented. Tools for security analysis and information services are analyzed in terms of the possibility of automatic or automated data exchange. A method for integrating multiagent systems with tools for security analysis (information services) for modern digital infrastructures is proposed.
Literatur
1.
Zurück zum Zitat Kon’kov, A.E., A method for optimizing the interaction of a multi-agent control system with a relational database, Materialy Mezhdunarodnogo molodezhnogo nauchnogo foruma Lomonosov-2016 Sektsiya Fizika (Proc. Int. Youth Scientific Forum Lomonosov-2016. Section Physics), 2016, vol. 1, pp. 135–137. Kon’kov, A.E., A method for optimizing the interaction of a multi-agent control system with a relational database, Materialy Mezhdunarodnogo molodezhnogo nauchnogo foruma Lomonosov-2016 Sektsiya Fizika (Proc. Int. Youth Scientific Forum Lomonosov-2016. Section Physics), 2016, vol. 1, pp. 135–137.
2.
Zurück zum Zitat Bol’shakova, E.I. and Kudasov, N.D., An approach to the design of modular multi-agent systems, Lomonosovskie Chteniya: Nauchnaya konferentsiya (Lomonosov Readings: Scientific Conference), Moscow, 2016. Bol’shakova, E.I. and Kudasov, N.D., An approach to the design of modular multi-agent systems, Lomonosovskie Chteniya: Nauchnaya konferentsiya (Lomonosov Readings: Scientific Conference), Moscow, 2016.
3.
Zurück zum Zitat Kudasov, N.D., Modular multi-agent systems in functional programming languages, Sb. Statei Molodykh Uch. Fak. Vychisl. Mat. Kibern. Mosk. Gos. Univ., 2015, vol. 12, pp. 58–74. Kudasov, N.D., Modular multi-agent systems in functional programming languages, Sb. Statei Molodykh Uch. Fak. Vychisl. Mat. Kibern. Mosk. Gos. Univ., 2015, vol. 12, pp. 58–74.
4.
Zurück zum Zitat Shestakova, M.A. and Shestakov, E.I., Artificial intelligence and the problem of multi-agent system control, Neirokomp’yut.: Razrab. Primen., 2016, no. 6, pp. 50–52. Shestakova, M.A. and Shestakov, E.I., Artificial intelligence and the problem of multi-agent system control, Neirokomp’yut.: Razrab. Primen., 2016, no. 6, pp. 50–52.
5.
Zurück zum Zitat Grusho, A.A. and Timonina, E.E., Security in a multi-agent system, Trudy mezhdunarodnoi konferentsii “Informatsionnye tekhnologii v nauke, obrazovanii, telekommunikatsii, biznese (osennyaya sessiya)” (Proc. Int. Conf. Information Technologies in Science, Education, Telecommunications, and Business (Autumn Session)), Zaporizhzhia, 2001, pp. 129–130. Grusho, A.A. and Timonina, E.E., Security in a multi-agent system, Trudy mezhdunarodnoi konferentsii “Informatsionnye tekhnologii v nauke, obrazovanii, telekommunikatsii, biznese (osennyaya sessiya)” (Proc. Int. Conf. Information Technologies in Science, Education, Telecommunications, and Business (Autumn Session)), Zaporizhzhia, 2001, pp. 129–130.
6.
Zurück zum Zitat Kon’kov, A.E., A method for optimizing the interaction of a multi-agent control system with a relational database, Materialy Mezhdunarodnogo molodezhnogo nauchnogo foruma Lomonosov-2016 Sektsiya Fizika (Proc. Int. Youth Scientific Forum Lomonosov-2016. Section Physics), 2016, vol. 1, pp. 135–137. Kon’kov, A.E., A method for optimizing the interaction of a multi-agent control system with a relational database, Materialy Mezhdunarodnogo molodezhnogo nauchnogo foruma Lomonosov-2016 Sektsiya Fizika (Proc. Int. Youth Scientific Forum Lomonosov-2016. Section Physics), 2016, vol. 1, pp. 135–137.
7.
Zurück zum Zitat Yaqin Hedin and Esmiralda Moradian, Security in multi-agent systems, Procedia Comput. Sci., 2015, vol. 60, pp. 1604–1612. Yaqin Hedin and Esmiralda Moradian, Security in multi-agent systems, Procedia Comput. Sci., 2015, vol. 60, pp. 1604–1612.
8.
Zurück zum Zitat Shakshuki, E. and Reid, M., Multi-agent system applications in healthcare: Current technology and future roadmap, Procedia Comput. Sci., 2015, vol. 52, pp. 252–261.CrossRef Shakshuki, E. and Reid, M., Multi-agent system applications in healthcare: Current technology and future roadmap, Procedia Comput. Sci., 2015, vol. 52, pp. 252–261.CrossRef
9.
Zurück zum Zitat Chandramohan Dhasarathan, Sathian Dananjayan, Rajaguru Dayalan, Vengattaraman Thirumal, and Dhavachelvan Ponnurangam, A multi-agent approach: To preserve user information privacy for a pervasive and ubiquitous environment, Egypt. Inf. J., 2015, vol. 16, no. 1, pp. 151–166. Chandramohan Dhasarathan, Sathian Dananjayan, Rajaguru Dayalan, Vengattaraman Thirumal, and Dhavachelvan Ponnurangam, A multi-agent approach: To preserve user information privacy for a pervasive and ubiquitous environment, Egypt. Inf. J., 2015, vol. 16, no. 1, pp. 151–166.
10.
Zurück zum Zitat Rodríguez, S. and Bajo, J., Multi-agent system for management and monitoring of routes surveillance, International Workshop on Hybrid Artificial Intelligence Systems, 2008, pp. 38–45. Rodríguez, S. and Bajo, J., Multi-agent system for management and monitoring of routes surveillance, International Workshop on Hybrid Artificial Intelligence Systems, 2008, pp. 38–45.
11.
Zurück zum Zitat Boudaoud, K. and Guessoum, Z., A multi-agents system for network security management, Sixth IFIP Conference on Intelligence in Networks (SmartNet’2000), Vienna, 2000. Boudaoud, K. and Guessoum, Z., A multi-agents system for network security management, Sixth IFIP Conference on Intelligence in Networks (SmartNet’2000), Vienna, 2000.
12.
Zurück zum Zitat Rashvand, H.F., Salah, K., Calero, J.M.A., and Harn, L., Distributed security for multi-agent systems—review and applications, IET Inf. Secur., 2010, vol. 4, no. 4, pp. 188–201.CrossRef Rashvand, H.F., Salah, K., Calero, J.M.A., and Harn, L., Distributed security for multi-agent systems—review and applications, IET Inf. Secur., 2010, vol. 4, no. 4, pp. 188–201.CrossRef
14.
Zurück zum Zitat Nikishova, A.V., A multi-agent system for detecting attacks on the information system of the enterprise, Extended Abstract of Cand. Sci. (Eng.) Dissertation, Volgograd, 2013. Nikishova, A.V., A multi-agent system for detecting attacks on the information system of the enterprise, Extended Abstract of Cand. Sci. (Eng.) Dissertation, Volgograd, 2013.
15.
Zurück zum Zitat Gorodetskii, V.I. and Kotenko. I.V., The architecture of the basic agents of a multi-agent information security system in computer networks, Izv. Yuzhn. Fed. Univ., 2000. Gorodetskii, V.I. and Kotenko. I.V., The architecture of the basic agents of a multi-agent information security system in computer networks, Izv. Yuzhn. Fed. Univ., 2000.
16.
Zurück zum Zitat Kosenko, M.Yu., A multi-agent system for detecting and blocking botnets by identifying control traffic using data mining, Cand. Sci. (Eng.) Dissertation, Ufa State Aviation Technical University, 2017. Kosenko, M.Yu., A multi-agent system for detecting and blocking botnets by identifying control traffic using data mining, Cand. Sci. (Eng.) Dissertation, Ufa State Aviation Technical University, 2017.
17.
Zurück zum Zitat Mukhataev, Yu.B., Methods and means for predicting cerebrovascular accidents using bio-impedance analysis and multi-agent intelligent models, Extended Abstract of Cand. Sci. (Eng.) Dissertation, Kursk, 2017. Mukhataev, Yu.B., Methods and means for predicting cerebrovascular accidents using bio-impedance analysis and multi-agent intelligent models, Extended Abstract of Cand. Sci. (Eng.) Dissertation, Kursk, 2017.
18.
Zurück zum Zitat Cao, L., Weiss, G., and Yu, P.S., A brief introduction to agent mining, Auton. Agents Multi-Agent Syst., 2012, vol. 25, no. 3, pp. 419–424.CrossRef Cao, L., Weiss, G., and Yu, P.S., A brief introduction to agent mining, Auton. Agents Multi-Agent Syst., 2012, vol. 25, no. 3, pp. 419–424.CrossRef
19.
Zurück zum Zitat Kogalovskii, M.R., Metody integratsii dannykh v informatsionnykh sistemakh (Methods of Data Integration in Information Systems), Moscow: Inst. Probl. Rynka Ross. Akad. Nauk, 2010. Kogalovskii, M.R., Metody integratsii dannykh v informatsionnykh sistemakh (Methods of Data Integration in Information Systems), Moscow: Inst. Probl. Rynka Ross. Akad. Nauk, 2010.
20.
Zurück zum Zitat Eltabakh, M., Data Integration, Worcester, Massachusetts: Worcester Polytechnic Institute, 2012. Eltabakh, M., Data Integration, Worcester, Massachusetts: Worcester Polytechnic Institute, 2012.
21.
Zurück zum Zitat Tanca, L., An Introduction to Data Integration, Technologies for Information Systems. http://home.deib.polimi.it/ schreibe/TeSI/Materials/Tanca/PDFTanca/TSI_data-integration.pdf. Tanca, L., An Introduction to Data Integration, Technologies for Information Systems. http://​home.​deib.​polimi.​it/​ schreibe/TeSI/Materials/Tanca/PDFTanca/TSI_data-integration.pdf.
22.
Zurück zum Zitat Ziegler, P. and Dittrich, K.R., Data integration—problems, approaches, and perspectives, in Conceptual Modelling in Information Systems Engineering, Krogstie, J., Opdahl, A.L., and Brinkkemper, S., Eds., Springer, 2007, pp. 39–58. Ziegler, P. and Dittrich, K.R., Data integration—problems, approaches, and perspectives, in Conceptual Modelling in Information Systems Engineering, Krogstie, J., Opdahl, A.L., and Brinkkemper, S., Eds., Springer, 2007, pp. 39–58.
23.
Zurück zum Zitat Lavrova, D.S. and Pechenkin, A.I., Detecting security incidents in the Internet of Things, Probl. Inf. Bezop., Komp’yut. Sist., 2015, no. 2, pp. 69–79. Lavrova, D.S. and Pechenkin, A.I., Detecting security incidents in the Internet of Things, Probl. Inf. Bezop., Komp’yut. Sist., 2015, no. 2, pp. 69–79.
24.
Zurück zum Zitat Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, SIN’17 Proceedings of the 10th International Conference on Security of Information and Networks, Jaipur, 2017, pp. 295–298. Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, SIN’17 Proceedings of the 10th International Conference on Security of Information and Networks, Jaipur, 2017, pp. 295–298.
25.
27.
Zurück zum Zitat Zegzhda, D.P. and Kalinin, M.O., Logical security evaluation of real-world operating systems, International Conference on Enterprise Information Systems and Web Technologies 2007, 2007, pp. 234–241. https://www.scopus.com/ inward/record.uri?eid=2-s2.0-84878134140&partnerID=40&md5=6e5f7bb7a582d741d64700e418cb9db9. Zegzhda, D.P. and Kalinin, M.O., Logical security evaluation of real-world operating systems, International Conference on Enterprise Information Systems and Web Technologies 2007, 2007, pp. 234–241. https://​www.​scopus.​com/​ inward/record.uri?eid=2-s2.0-84878134140&partnerID=40&md5=6e5f7bb7a582d741d64700e418cb9db9.
28.
Zurück zum Zitat Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-sustainability of software-defined networks based on situational management, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 984–992.CrossRef Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-sustainability of software-defined networks based on situational management, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 984–992.CrossRef
29.
Zurück zum Zitat Grusho, A.A., Grusho, N.A., and Timonina, E.E., Methods of protecting information from attacks using hidden channels and hostile software and hardware agents in distributed systems, Vestn. Ross. Gos. Gumanit. Univ., Ser.: Dok. Arkh., Inf.,Zashch. Inf. Inf. Bezop., 2009, vol. 10, pp. 33–45. Grusho, A.A., Grusho, N.A., and Timonina, E.E., Methods of protecting information from attacks using hidden channels and hostile software and hardware agents in distributed systems, Vestn. Ross. Gos. Gumanit. Univ., Ser.: Dok. Arkh., Inf.,Zashch. Inf. Inf. Bezop., 2009, vol. 10, pp. 33–45.
Metadaten
Titel
Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures
verfasst von
N. A. Grusho
Publikationsdatum
01.12.2019
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2019
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411619080091

Weitere Artikel der Ausgabe 8/2019

Automatic Control and Computer Sciences 8/2019 Zur Ausgabe

Neuer Inhalt