Mallah, G.A., Shaikh, N.A., Shaikh, Z.A. and Shah, Mahmood Hussain (2011) A Profiling Model on the top of Agent Collaborative Environment to Monitor Suspicious Activities. SINDH UNIVERSITY RESEARCH JOURNAL, 43 (1-A). ISSN 1813-1743
Full text not available from this repository.
Official URL: http://www.usindh.edu.pk/surj_43/1.pdf
The profiles of all insiders in the organization are built and maintained in the proposed model to identify threat. Software agents are autonomously working to record all activities of the authenticated users. When profile is matured, it is compared with the policy of the organization and insider’s profile is marked as acceptable or suspicious accordingly. The model is generic, adaptable and can be deployed most of the organizations without changing its code. Manager agents and the Profiling agents have been designed for implementation of the model. Profiling agents trace all activities and behavior of the authenticated employees and send to the Manager agent for necessary processing for its analysis. The decision is taken at the Manager Agent end to avoid any threat.
|Uncontrolled Keywords (separate with ;):||software Agents; Insider Threat; Profiling ;Behavior Monitoring; Network Security|
|Subjects:||Q Science > QA Mathematics > QA76 Computer software|
|Schools:||College of Business, Law & Applied Social Studies > Lancashire Business School|
|Deposited By:||Carmit Erez|
|Deposited On:||17 Aug 2012 12:07|
|Last Modified:||14 Feb 2013 14:03|
Downloads per month over past year
Downloads for past 30 days
Repository Staff Only: item control page