Güvenlik Uygulamaları için Ajan Sistemler ve Otonomi
Özlem Ünlü1*, Aydın Çetin2
1TÜBİTAK ULAKBİM , Ankara, Turkey
2Gazi University, Ankara, Turkey
* Corresponding author: ozlemkilic_aks@yahoo.com
Presented at the 2nd International Symposium on Innovative Approaches in Scientific Studies (ISAS2018-Winter), Samsun, Turkey, Nov 30, 2018
SETSCI Conference Proceedings, 2018, 3, Page (s): 1391-1395
Published Date: 31 December 2018
Gelişen bilgisayar ve iletişim teknolojileri sonucunda güvenlik önemli bir konu haline gelmiştir. Güvenlik açıkları yetkilendirme, veri bütünlüğü sağlama, ağ güvenliği gibi sistemin çalışmasında etkili kısım veya kısımlarda olabilmektedir. Bir sistemin güvenliği bir takım araç-politikalarla sağlanır. Veri bütünlüğü için çeşitli yedekleme-birleştirme politikaları kullanılırken, sistemde var olan zararlının tespiti için tarama araçları kullanılmaktadır. Güvenlik uygulamalarında araçların kullanımında etkin bir yönetim ve karar destek yapısı oluşturmak için ajan sistemlerden etkin bir şekilde yararlanmak mümkündür. Bu çalışmada Güvenlik Uygulamaları için ajan kavramı ve ajanlarda otonomi çalışmaları incelenmiştir.
Keywords - Güvenlik, otonom, ajan, ajan tabanlı mimari
[1] UK Ministry of Defence (MOD). The UK Approach to Unmanned Aircraft System: Joint Doctrine Note 2/11, 2012.
[2] Williams, R. Autonomous Systems Overview. BAE Systems, 2008.
[3] S Franklin, A Graesser, Is it an Agent, or just a Program?: A Taxonomy for Autonomous Agents Intelligent agents III agent theories, architectures, 1997 – Springer.
[4] http://www.crystaliz.com/logicware/mubot.html]
[5] Stuart J. Russell and Peter Norvig. Artificial Intelligence: A Modern Approach. Prentice Hall, 1995.
[6] Pattie Maes. Artificial Life Meets Entertainment: Life like Autonomous Agents. Communications of the ACM. (38):11, 108-114, 1995.
[7] http://activist.gpl.ibm.com/WhitePaper/ptc2.htm [8] Tolk, A., and Uhrmacher, A.M. ‘Agents: Agenthood, Agent Architectures, and Agent Taxonomies’. In Agent-Directed Simulation and Systems Engineering, edited by Yilmaz and Ören, 75–109. Weinheim, Germany: Wiley-VCH, 2009.
[9] https://www.turkcebilgi.com/güvenlik
[10] Roy H. Campbell, and Tin Qian. Dynamic agent- based security architecture for mobile computers. In the Second International Conference on Parallel and Distributed Computing and Networks, Brisbane, Australia, December 1998.
[11] http://static.tenable.com/prod_docs/SC_5.1_with_Nessus_Age nts.pdf
[12] Zhaoyu Liu, Prasad Naldurg, Seung Yi, Tin Qian, Roy H. Campbell, and M. Dennis Mickunas, An Agent Based Architecture for Supporting Application Level Security. DARPA Information Survivability Conference and Exposition, Hilton Head Island, South Carolina, January 2000.
[13] Roy H. Campbell and M. Dennis Mickunas. Building dynamic interoperable security architecture for active networks. an accepted proposal to DARPA BAA9803, 1998.
[14] Roy H. Campbell, Zhaoyu Liu, M. Dennis Mickunas, Prasad Naldurg, and Seung Yi, Seraphim: Dynamic Interoperable Security Architecture for Active Networks. IEEE Third Conference on Open Architectures and Network Programming Proceedings (OPENARCH’2000), Tel Aviv, Israel, March 2000.
[15] Patent: A. Ott, F. Oldham, Computer network security system utilizing dynamic mobile sensor agents, 2004.
[16] Shantanu Pal, Sunirmal Khatua, Nabendu Chaki, Sugata Sanyal,“A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security,” Annals of Faculty Engineering Hunedoara International Journal of Engineering (Archived copy), scheduled for publication in vol. 10, issue 1, January 2012. ISSN: 1584-2665.
[17] Dasgupta, D., Gonzalez, F., Yallapu, K., Gomez, J. and Yarramsettii, R. CIDS: An agent-based intrusion detection system, Computers Security, Volume 24, Issue 5 , pp. 387-398, 2005.
[18] M. K. Chirumanilla, B. Ramamurlhy, " Agent Based Intrusion Detection and Response System for Wireless LANs ," IEEE International Conference on Communications, 2003. ICC '03.
![]() |
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |