Press "Enter" to skip to content

Adaptive real-time anomaly detection for safeguarding by by Kalle Burbeck.

By by Kalle Burbeck.

Show description

Read Online or Download Adaptive real-time anomaly detection for safeguarding critical networks PDF

Similar networking books

Extra info for Adaptive real-time anomaly detection for safeguarding critical networks

Example text

Cyber layer. This is the computers, networks and data gathering sensors that are used to monitor and control the physical layer. In the telecommunications domain, the cyber infrastructure is used to monitor and control the many routers and switches within the system. In the electricity domain, the cyber infrastructure gathers information about power flows and breaker states and transmits the operators’ control signals to the breakers and transformers. Although the cyber layer may share communications channels with the physical layer - in telecommunications, for example - the data that is transmitted within the cyber layer has a very different function from that within the physical layer.

Have new versions and bug-fixes been released recently? • Security - What techniques are used to secure the agents? • Interoperability - Can external software be integrated? • Scalability - Can the platform manage large applications with many agents? T HE S AFEGUARD CONTEXT 37 • Footprint - Are the memory and CPU usages reasonable? Can both lightweight and heavyweight agents be implemented with the platform? • Platform requirements - Does the platform depend on specific operating systems and/or hardware?

Comparing agents to objects, two important differences in general are: • Autonomy - The object has state and so does the agent but the agent also incorporates the ability to initiate actions as what could be explained as having behaviours. • Independence - In addition to having behaviours the agent is also communicating by passing messages. When using objects the communication is accomplished through method invocation with references. 3. S OFTWARE AGENTS the control lies with the invoker, which is totally opposite the agent case where control lies with the receiver.

Download PDF sample

Rated 4.44 of 5 – based on 35 votes