The Community for Technology Leaders
Green Image
Issue No. 01 - January/February (2001 vol. 16)
ISSN: 1541-1672
pp: 74-80
Security management is a key issue in distributed computer systems. Resources and data need protection from unauthorized access, manipulation, and malicious intrusions that could render a system unreliable or unusable. The task's complexity calls for intelligent support systems that help system administrators detect and prevent intrusions and define appropriate countermeasures. Together with researchers at Hewlett Packard Laboratories Bristol (UK), the authors have integrated PlanNet, a constraint-based planner, in an intrusion detection system that dynamically computes plans for repairing and reconfiguring an attacked system. The integration of AI planning techniques greatly increases IDS flexibility. They have implemented the system in the constraint logic programming language Eclipse and tested it on real cases. A user-friendly, Java-based interface enables simple, direct communication with the user.
constraint satisfaction, intrusion detection system, planning, security management

R. Barruffi, M. Milano and R. Montanari, "Planning for Security Management," in IEEE Intelligent Systems, vol. 16, no. , pp. 74-80, 2001.
96 ms
(Ver 3.3 (11022016))