This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Planning for Security Management
January/February 2001 (vol. 16 no. 1)
pp. 74-80
Security management is a key issue in distributed computer systems. Resources and data need protection from unauthorized access, manipulation, and malicious intrusions that could render a system unreliable or unusable. The task's complexity calls for intelligent support systems that help system administrators detect and prevent intrusions and define appropriate countermeasures. Together with researchers at Hewlett Packard Laboratories Bristol (UK), the authors have integrated PlanNet, a constraint-based planner, in an intrusion detection system that dynamically computes plans for repairing and reconfiguring an attacked system. The integration of AI planning techniques greatly increases IDS flexibility. They have implemented the system in the constraint logic programming language Eclipse and tested it on real cases. A user-friendly, Java-based interface enables simple, direct communication with the user.
Index Terms:
constraint satisfaction, intrusion detection system, planning, security management
Citation:
Rosy Barruffi, Michela Milano, Rebecca Montanari, "Planning for Security Management," IEEE Intelligent Systems, vol. 16, no. 1, pp. 74-80, Jan.-Feb. 2001, doi:10.1109/5254.912387
Usage of this product signifies your acceptance of the Terms of Use.