Document Details

Document Type : Thesis 
Document Title :
ONTOLOGY-BASED NEWTORK SECURITY MANAGEMENT USING MOBILE AGENT
أسلوب إدارة أمنية الشبكات المبني على طريقة تمثيل المفاهيم باستخدام الوكيل المتنقل
 
Subject : Faculty of Computing and Information Technology 
Document Language : Arabic 
Abstract : Computer networks, and in particular the Internet, is indispensible in the everyday life of almost all aspects including commercial, educational, governmental, social, etc. Network security is therefore of extreme importance to protect the valuable data and to provide reliable access to it whenever and wherever requested. Manual techniques for managing network security require continuous attention of the network administrator, and it tends to be infeasible and error prone as the network size increases. Consequently, for moderate and large network sizes it would be inevitable to consider the use of an automatic network security management (NSM) system that should be flexible and independent of the network administrator and other human intervention. This research is directed to investigate the possibility of developing an automatic NSM system in such a way that provides both flexibility in deciding the system’s objectives and efficiency in using the valuable network bandwidth with a relatively low transmission overhead. Several techniques are possible to develop a NSM system, but it is considered that the required flexibility and efficiency could be advantageously obtained using (a) mobile agents (MA) to collect the required security information from various network devices, and (b) ontology to specify the required security policies in such a way understandable by the MA’s software. The present work attempts to prove the feasibility of a NSM system based on mobile agents and ontology by developing a simplified NSM prototype, and implementing and testing it practically in a typical local area network. The prototype is designed and implemented to monitor the configuration of the network components by establishing a suitable platform that allows the mobile agent to travel through the network and collect the necessary information using an ontology-based security policy. The developed system is designed to perform two main tasks: 1. Collecting information from network components such as routers, servers, hosts, and etc. As an example of such information the developed MA is concerned with the antivirus program information, and windows password policies. After collecting the required information from the specified network devices, the MA returns back to the network administrator and let him decide and perform the suitable actions. 2. An alternative behavior is also possible when examining user hosts by allowing the mobile agent itself to take the appropriate decision if it realizes that the collected information does not match the specified security policy. In this case it shows a message on the host’s monitor requesting the user to reconfigure his host computer according to the required security policy. Next, the MA stores and eventually returns these decisions to the network administrator. The developed prototype is implemented using the following software:  The Java libraries that is used to develop the user interface windows , and other Java statements to retrieve the windows password policies.  The Aglet library that creates the agents and provides the necessary platform for agents traveling through the network.  The Jena that is used to retrieve the policies represented by ontology.  The JNIRegistry library which is used to access the windows registry The development process included three major phases. The first phase is concerned with the specification of the required policies for the selected information, namely the antivirus program and the windows password. Ontology is written to represent these policies. The second phase is the establishment of the proper platform, using Aglet, to allow for the MA travels. The last phase is the actual coding of the MA logic to collect the information and return back to the administrator. This prototype is tested to examine its functionality using a minimum network consisting of three computers with different configurations. One computer is properly configured to match the required security policies, the other is configured to match some required security policies and the last one does not match any one of the considered security policies. The developed MA was able to understand the ontology and move around the network. It has properly detected the components that are wrongly configured. It should be made clear that although the practical test was carried out using a minimal network, yet the design is scalable and can be directly applied to more computers in a local area network or even in a wide area network. 
Supervisor : Prof. Dr. Mohammed Ashraf Madkour 
Thesis Type : Master Thesis 
Publishing Year : 1432 AH
2011 AD
 
Co-Supervisor : Dr. Omar Abdullah Batarfi 
Added Date : Sunday, July 17, 2011 

Researchers

Researcher Name (Arabic)Researcher Name (English)Researcher TypeDr GradeEmail
عبد الله مارش عليAli, Abdullah MarichResearcherMaster 

Files

File NameTypeDescription
 29961.pdf pdf 

Back To Researches Page