Arquitectura multi-agente adaptativa para la detección de ataques en entornos dinámicos y distribuidos /

Distributed computing surged inside the academic and research communities trying to satisfy the growing need of connectivity and collaboration among the members of these communities, and have acquired a high importance for the industrial and business sectors. Nowadays there exists a high level of de...

Descripción completa

Detalles Bibliográficos
Autor principal: Pinzón Trejos, Cristian Iván (sustentante)
Otros Autores: Corchado Rodríguez, Juan Manuel, 1971- (asesor), Bajo Pérez, Javier, 1976- (asesor)
Formato: Tesis Libro
Lenguaje:Spanish
Publicado: Salamanca, España : Universidad de Salamanca, 2010
Materias:
LEADER 08091nam a22004337i 4500
003 PA-PaUTB
005 20240611135844.0
007 ta
008 240606b sp ad||frm||| 00| | spa d
040 |a Sistema de Bibliotecas de la Universidad Tecnológica de Panamá 
041 0 |a spa 
082 0 4 |a 005.8  |b P6588  |2 21  |q PA-PaUTB 
100 1 |a Pinzón Trejos, Cristian Iván,  |e sustentante  |9 3331 
245 1 0 |a Arquitectura multi-agente adaptativa para la detección de ataques en entornos dinámicos y distribuidos /  |c Cristian Iván Pinzón Trejos ; asesores Juan Manuel Corchado Rodríguez, Javier Bajo Pérez. 
264 3 1 |a Salamanca, España :  |b Universidad de Salamanca,  |c 2010 
300 |a xvi, 223 páginas :  |b ilustraciones, tablas, gráficas ;   |c 25 cm 
336 |2 rdacontent  |a texto  |b txt 
337 |2 rdamedia  |a no mediado  |b n 
338 |2 rdacarrier  |a volumen  |b nc 
500 |a Doctorado en Informática y Automática. 
502 |a Tesis (  |b Doctorado). --  |c Universidad de Salamanca. Facultad de Ciencias. Doctorado en Informática y Automática,  |d 2010. 
504 |a Incluye bibliografía, páginas 201-223 y anexo, páginas 197-1999. 
505 0 |a Capítulo 1. Introducción. -- Capítulo 2. Seguridad en entornos dinámicos y distribuidos. -- Capítulo 3. Tecnologías Base. -- Capítulo 4. Arquitectura AIDeMaS. -- Chapter 5. Case Studies. -- Capítulo 6. Conclusiones y trabajo futuro. -- Anexo A. -- Bibliografía. 
506 0 |a No se presta a domicilio. 
520 3 |a Distributed computing surged inside the academic and research communities trying to satisfy the growing need of connectivity and collaboration among the members of these communities, and have acquired a high importance for the industrial and business sectors. Nowadays there exists a high level of dependence of the business and users on the distributed systems. However, as the distributed computing becomes a relevant paradigm for the business applications, there are new problems related to the information security. In this way, itis possible to find different threats aimed at exploiting the vulnerabilities of the components of the distributed applications. These threats mainly affect the application layer of the systems, since this layer can be considered as a key point for the user access and it is sensitive to security problems. Two of the threats that have gained an increasing relevance during the last years, especially regarding the frequency of the attacks and the impact on the functioning of the systems, are the SQL injection attacks and the denial of service attacks based on XML, in web services environments (XDoS). Both types of attack are characterized by the wide variety of techniques that can be used for the attack, and are a risk for the confidentiality and integrity of the data and the applications, but mainly for the availability of the resources. Current security policies are focused on guarantee confidentiality and integrity of the data, but more efforts are required to guarantee availability of the resources As itis necessary to provide new solutions to guarantee security for these types of threat, in this work is presented AlDeMaS, a multi-agent architecture designed for intrusion detection in distributed systems. The architecture defines different agent types that are specialized on the execution of the tasks that compose the attack detection process. The core component of the AlDeMaS architecture is a classification mechanism based on a CBR-BDI agent type, a deliberative agent type that integrates a case based reasoning engine in its internal structure. SQL injection and XDoS attacks detection requires new solutions and this study proposes a novel perspective where the detection strategy can be adapted to the continuous changes that occur in the techniques of attack, mainly based on the learning and adaptation capabilities of the CBR-BDI agents. Finally, to classify the attack patterns, the CBR-BDI agent incorporates automatic learning techniques in its internal structure. Machine learning is a promising field for the intrusion detection and allows proposing innovative strategies. Summarizing, the proposed architecture represents a meaningful advance in the field of intrusion detection, providing a new perspective that makes use of a set of technologies and techniques of the Artificial Intelligence. 
520 3 |a Distributed computing surged inside the academic and research communities trying to satisfy the growing need of connectivity and collaboration among the members of these communities, and have acquired a high importance for the industrial and business sectors. Nowadays there exists a high level of dependence of the business and users on the distributed systems. However, as the distributed computing becomes a relevant paradigm for the business applications, there are new problems related to the information security. In this way, itis possible to find different threats aimed at exploiting the vulnerabilities of the components of the distributed applications. These threats mainly affect the application layer of the systems, since this layer can be considered as a key point for the user access and it is sensitive to security problems. Two of the threats that have gained an increasing relevance during the last years, especially regarding the frequency of the attacks and the impact on the functioning of the systems, are the SQL injection attacks and the denial of service attacks based on XML, in web services environments (XDoS). Both types of attack are characterized by the wide variety of techniques that can be used for the attack, and are a risk for the confidentiality and integrity of the data and the applications, but mainly for the availability of the resources. Current security policies are focused on guarantee confidentiality and integrity of the data, but more efforts are required to guarantee availability of the resources As itis necessary to provide new solutions to guarantee security for these types of threat, in this work is presented AlDeMaS, a multi-agent architecture designed for intrusion detection in distributed systems. The architecture defines different agent types that are specialized on the execution of the tasks that compose the attack detection process. The core component of the AlDeMaS architecture is a classification mechanism based on a CBR-BDI agent type, a deliberative agent type that integrates a case based reasoning engine in its internal structure. SQL injection and XDoS attacks detection requires new solutions and this study proposes a novel perspective where the detection strategy can be adapted to the continuous changes that occur in the techniques of attack, mainly based on the learning and adaptation capabilities of the CBR-BDI agents. Finally, to classify the attack patterns, the CBR-BDI agent incorporates automatic learning techniques in its internal structure. Machine learning is a promising field for the intrusion detection and allows proposing innovative strategies. Summarizing, the proposed architecture represents a meaningful advance in the field of intrusion detection, providing a new perspective that makes use of a set of technologies and techniques of the Artificial Intelligence. 
541 1 |a Cristian Iván Pinzón Trejos.  |c DUTP  |d Recibido: 2011/02/02.  |e 144456.  |h $100.00. 
650 1 7 |a Arquitectura de software  |2 LEMB  |9 4612 
650 2 7 |a Inteligencia artificial distribuida  |2 LEMB  |9 8206 
650 2 7 |a Redes de computadores  |2 LEMB  |9 391 
650 2 7 |a Seguridad en computadores  |2 LEMB  |9 2144 
650 2 7 |a Sistemas multiagente  |2 LEMB  |9 5059 
653 0 |a Doctorado en Informática y Automática 
700 1 |a Corchado Rodríguez, Juan Manuel,  |d 1971-,  |e asesor  |9 4456 
700 1 |a Bajo Pérez, Javier,   |d 1976-,  |e asesor  |9 8196 
942 |2 ddc  |c TESISD 
946 |a 44903  |b Cleofe Galindo J.  |c 44903  |d Cleofe Galindo J. 
999 |c 144456  |d 144456 
952 |0 0  |1 0  |2 ddc  |4 0  |6 TD_005_800000000000000_P6588_2010  |7 0  |8 TESDOC  |9 179833  |a BUT  |b BUT  |d 2024-06-06  |e DUTP  |g 100.00  |l 0  |o TD 005.8 P6588 2010  |p 800119276  |r 2024-06-06  |t e.1  |w 2024-06-06  |y TESISD