tailieunhanh - Distributed Network Security Management Using Intelligent Agents

The next step is to deploy Outpost Network Security Client to the client computers in the Active Directory domain (Windows 2000 or later). This can be done via Group Policy using the Software installation policy. As the policy is applied to computers that are subject to the Group Policy Object (GPO) only, the GPO must be linked to the computers you want to protect, otherwise the policy will not be applied and Outpost Network Security Client will not be installed. You can then link the policy to any other computer and it will be applied during its next startup or. | Distributed Network Security Management Using Intelligent Agents K. Boudaoud Corporate Communication Department EURECOM Institute Sophia-Antipolis France Email boudaoud@ N. Agoulmine PRISM Laboratory University of Versailles-Saint Quentin en Yvelines Versailles France Email naz@ De Souza Department of Computer Science Federal University of Ceará Fortaleza Brazil E-mail neuman@ Abstract The openness of business toward telecommunication network in general and Internet in particular is performed at the prize of high security risks. Every professional knows that the only way to secure completely a private network is to make it unreachable. However even if this solution was undertaken for many years nowadays it is not possible to close private network especially for business purpose. Existing security solutions are in general very complex and costly. Thus there is a need to think about new type of security mechanism based on recent technologies. One such technology which is gaining ground is Intelligent Agent Technology. Thus the purpose of this paper is the investigation of novel architectures and mechanisms based on IA Technology in order to purpose efficient flexible adaptable and cost effective solutions. Keywords Distributed Computing Security Management Distributed Intrusion Detection Intelligent Agent Technology. 1- Introduction The ongoing Explosion in use of Internet combined with the deregularisation of telecommunication is an indication of the scale of the revolution that is happening. However this explosion is introducing a huge problem of security for both the networks and services. The needs of remote access from customers users and service provider to a particular environment requires that the precautions must taken in order to make a balance between the security demands and the access flexibility. The existing security solutions are very complex and costly. What is rapidly needed is a flexible adaptable and affordable .

TỪ KHÓA LIÊN QUAN