Lyapustin A., Kolesnikova S., Mel'nik D. —
Security Model Based on a Multi-Agent System
// Software systems and computational methods. – 2018. – ¹ 3.
– P. 81 - 90.
DOI: 10.7256/2454-0714.2018.3.26575
URL: https://en.e-notabene.ru/itmag/article_26575.html
Read the article
Abstract: The article is devoted to the urgent problem of ensuring the security of heterogeneous information platforms using a multi-agent threat detection system. The object of the study is a multi-agent platform. The authors pay special attention to such aspects of the topic as: security of multi-agent platforms, management of threat detection agents, interconnection between different threat detection agents, vulnerability in multi-agent platforms. Trends are being considered for the development of new distributed security models. The paper presents a multi-agent architecture for security services, as well as a general scenario for deploying security in multi-agent threat detection systems. The paper presents a multi-agent architecture for security services, as well as a general scenario for deploying security in multi-agent threat detection systems. Using a multi-agent system approach to a security model that provides control from the sender using the mobility and extensibility characteristics of the agent. The multi-agent protection system model for heterogeneous information platforms provides an improved approach for online communications, providing flexible mechanisms for the comprehensive protection of heterogeneous information platforms that can satisfy various security requirements and provide better control over the data to its sender.
Lyapustin A. —
Security of the Multi-Agent Platform
// Software systems and computational methods. – 2017. – ¹ 3.
– P. 16 - 24.
DOI: 10.7256/2454-0714.2017.3.23311
URL: https://en.e-notabene.ru/itmag/article_23311.html
Read the article
Abstract: The research is devoted to the topical issue of ensuring security of heterogeneous information platforms applying the multi-agent threat detection systems. The object of the research is the multi-agent platform. The author pays special attention to such aspects of the topic as security of multi-agent platforms, managing threat detection agents, interaction between different threat detection agents, and vulnerability of multi-agent platforms. The author also analyses tendencies for developing new distributed security structures. In his research Lyapustin offers a mutl-agent structure that can be used by security service as well as a general scenario for deploying security policy in threat detection multi-agent systems. In terms of theory, the results of the research demonstrate the need to extend the scope of the multi-agent approach and integrate it with the intelligent analysis of information systems development and operation. The result of the research is the concept of a secure multi-agent platform that can be used in the treat detection multi-agent system.
Lyapustin A. —
Development and examination of the models and methods of comprehensive protection of heterogeneous information platforms
// National Security. – 2015. – ¹ 4.
– P. 508 - 514.
DOI: 10.7256/2454-0668.2015.4.15662
Read the article
Abstract: This work presents the analysis of the modern approaches towards development of comprehensive systems for protecting heterogeneous information platforms. Despite the advantages of the reviewed approaches, majority of them are aimed at solving a particular task, rather than a complex solution to the problem of protection of information in the environment of sophisticated heterogeneous systems. This article demonstrates the architecture of a heterogeneous information system acting as an object of protection. The result of the conducted research lies in the formation of a concept of creation of an Information Security System, the architecture of which is built upon a multi-agent approach and is oriented towards heterogeneous information systems. The author proposes a model for a comprehensive protection of the heterogeneous information platforms and examines the methodology for intelligent threat detection. The results of this research suggest increasing the area of use of the multi-agent approach and its integration into the intelligent analysis of development and functionality of the information systems.