A Study on the Prevent the Illegal Access by Granting the Command Ranks


The Transactions of the Korea Information Processing Society (1994 ~ 2000), Vol. 7, No. 8, pp. 2641-2649, Aug. 2000
10.3745/KIPSTE.2000.7.8.2641,   PDF Download:

Abstract

The security management of a computer network is becoming important, and many studies have been done regarding Intrusion Detection Systems to detect illegal access to the system. It is significant to prevent mobile agents from an evil influence on the system. It is quite impossible to detect these illegal acts before it activates in servers. In this paper, We have defined allowable command sets of each agent and studied how to detect intrusions when they use disallowable commands on server. We propose, in this paper, how to grant ranks to agents, how to give command sets according to ranks and how to keep watch on command usages when they exchange messages. The system we proposed consists of a communication module, a message checking module, an ANS(Agent Name Server), and an OTS(Ontology Type Server). We need an ANS to register and manage agents, and OTS to analyze differential ontology information, change it into usable format and analyze the necessary message. If the illegal activities of agent are detected, then the system could disconnect the access or cancel the registration of the agent.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
Y. S. Lim, D. S. Jang, H. Jung, "A Study on the Prevent the Illegal Access by Granting the Command Ranks," The Transactions of the Korea Information Processing Society (1994 ~ 2000), vol. 7, no. 8, pp. 2641-2649, 2000. DOI: 10.3745/KIPSTE.2000.7.8.2641.

[ACM Style]
Yong Sung Lim, Duk Sung Jang, and Hong Jung. 2000. A Study on the Prevent the Illegal Access by Granting the Command Ranks. The Transactions of the Korea Information Processing Society (1994 ~ 2000), 7, 8, (2000), 2641-2649. DOI: 10.3745/KIPSTE.2000.7.8.2641.