Categorization of malicious behaviors using ontology-based cognitive agents

Umar Manzoor*, Samia Nefti, Yacine Rezgui

*Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    Abstract

    Every organization uses computer networks (consisting of networks of networks) for resource sharing (i.e. printer, files, etc.) and communication. Computer networks today are increasingly complex, and managing such networks requires specialized expertise. Monitoring systems help network administrators in monitoring and protecting their network by not allowing users to run illegal application or changing the configuration of network nodes. In this paper we have developed an agent based system for activity monitoring on networks (ABSAMN) and proposed Categorization of Malicious Behaviors using Cognitive Agents (CMBCA). This uses ontology to predict unknown illegal applications based on known illegal application behaviors. CMBCA is an intelligent multi agent system used to detect known and unknown malicious activities carried out users over the network. We have compared An Agent Based System for Activity Monitoring on Network (ABSAMN) and Categorization of Malicious Behaviors using Cognitive Agents (CMBCA) concurrently at the university campus having seven labs equipped with 20 to 300 PCs in various labs. Both systems were tested on the same configuration; results indicate that CMBCA outperforms ABSAMN in every aspect.

    Original languageEnglish
    Pages (from-to)40-56
    Number of pages17
    JournalData and Knowledge Engineering
    Volume85
    Early online date12 Jul 2012
    DOIs
    Publication statusPublished - 1 Mar 2013

    Keywords

    • Cognitive mobile agent
    • Collaborative multi-agent system
    • Distributed proxy server
    • Malicious activity
    • Network monitoring
    • Ontology

    Fingerprint

    Dive into the research topics of 'Categorization of malicious behaviors using ontology-based cognitive agents'. Together they form a unique fingerprint.

    Cite this