A Comparison of Mobile Agent and SNMP Message Passing for Network Security Management Using Event Cases | SpringerLink
Skip to main content

A Comparison of Mobile Agent and SNMP Message Passing for Network Security Management Using Event Cases

  • Conference paper
Autonomic Principles of IP Operations and Management (IPOM 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4268))

Included in the following conference series:

  • 385 Accesses

Abstract

Research has proposed that next generation Mobile Agent (MA) technology will achieve the overall notion of “Zero Touch” network management. The advantages offered by using MA-based Network Manage-ment (MANM) include reduction in network traffic, intelligence, automation, fault-tolerance, and robustness. From our previous research, we have developed a security-focused MA framework (MASAM) for achieving active network management. This paper aims to examine the implication of network traffic load when implementing network security management by using MANM through four simulated security attack event cases. Evaluation results indicate that the MANM approach can enhance performance and security when dealing with various security attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Harrington, D., Presuhn, R., Wijnen, B.: An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks, RFC3411, IETF (2002)

    Google Scholar 

  2. ISO/IEC 9596-1:1998, Common management information protocol - Part 1: Specification, Open Systems Interconnection (OSI) (October 2003)

    Google Scholar 

  3. ITU-T X.700, X.700: Management framework for Open Systems Interconnection (OSI) for CCITT applications, ITU-T Recommendations (September 1992)

    Google Scholar 

  4. Stephan, R., Ray, P., Paramesh, N.: Network management platform based on mobile agents. International Journal of Network Management 14, 59–73 (2004)

    Article  Google Scholar 

  5. Du, T.C., Li, E.Y., Chang, A.-P.: Mobile Agent in Distributed Network Management. Journal of Communications of the ACM 46(7), 127–132 (2003)

    Article  Google Scholar 

  6. Papavassiliou, S., Puliafito, A., Tomarchio, O., Ye, J.: Mobile agent based approach for efficient network management and resource allocation: framework and applications. IEEE Journal on Selected Areas in Communications 20(4), 858–872 (2002)

    Article  Google Scholar 

  7. Nwana, H.S.: Software Agents: An Overview. Knowledge Engineering Review 11(3), 205–244 (1996)

    Article  Google Scholar 

  8. OMG.: Agent Technology, Green Paper, OMG Document agent 00-09-01, Version 1.0, Agent Platform Special Interest Group, Object Management Group (OMG) (September 2000), available online at: http://www.objs.com/agent/index.html

  9. Gavalas, D., Greenwood, D., Ghanbari, M., O’Mahony, M.: An infrastructure for distributed and dynamic network management based on mobile agent technology. In: IEEE International Conference on Communications, pp. 1362–1366 (1999)

    Google Scholar 

  10. Reiser, H., Vogt, G.: Threat Analysis and Security Architecture of Mobile Agent based Management Systems. In: Proceedings of NOMS 2000, IEEE/IFIP Network Operations and Management Symposium, Honolulu, Hawaii, USA (April 2000)

    Google Scholar 

  11. Yang, K., Galis, A., Mota, T., Michalas, A.: Mobile Agent Security Facility for Safe Configuration of IP Networks, MANTRIP, the EU IST project (2002)

    Google Scholar 

  12. Baldi, M., Gai, S., Picco, G.: Exploiting Code Mobility in Decentralized and Flexible Network Management. In: Rothermel, K., Popescu-Zeletin, R. (eds.) MA 1997. LNCS, vol. 1219. Springer, Heidelberg (1997)

    Google Scholar 

  13. Papavassiliou, S., Puliafito, A., Tomarchio, O., Ye, J.: Mobile Agent-Based Approach for Efficient Network Management and Resource Allocation: Framework and Applications. IEEE Transactions on Systems 20(4) (May 2002)

    Google Scholar 

  14. Fong, C.-h., Parr, G., Morrow, P.: Security Implications of Mobile Agent based Network Management: a Review. In: EPSRC PostGraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, pp. 326–332 (2005), available online at: http://kenbane.infc.ulst.ac.uk/~ching/paper/PGNet2005-SIMANM.pdf

  15. Fong, C.-h., Parr, G., Morrow, P.: MASAM: A Mobile Agent Based Security Framework in Supporting Active Communications Network Management. Technical Paper, Faculty of Engineering, University of Ulster, UK (April 2006), http://kenbane.infc.ulst.ac.uk/~ching/paper/TechPaper2006-MASAM.pdf

  16. Bruschi, D., Ornaghi, A., Rosti, E.: S-ARP: a secure address resolution protocol. In: Proceedings of 19th Annual Computer Security Applications Conference, pp. 66–74 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fong, Ch., Parr, G., Morrow, P. (2006). A Comparison of Mobile Agent and SNMP Message Passing for Network Security Management Using Event Cases. In: Parr, G., Malone, D., Ó Foghlú, M. (eds) Autonomic Principles of IP Operations and Management. IPOM 2006. Lecture Notes in Computer Science, vol 4268. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11908852_14

Download citation

  • DOI: https://doi.org/10.1007/11908852_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-47701-3

  • Online ISBN: 978-3-540-47702-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics