By by Kalle Burbeck.
Read Online or Download Adaptive real-time anomaly detection for safeguarding critical networks PDF
Similar networking books
- Networking All-in-One Desk Reference For Dummies 3rd edition by Lowe, Doug (2008) Paperback
- NETWORKING 2012 Workshops: International IFIP TC 6 Workshops, ETICS, HetsNets, and CompNets, Held at NETWORKING 2012, Prague, Czech Republic, May 25, 2012. Proceedings
- CCDA: Cisco Certified Design Associate Study Guide, (640-861)
- Cisco Volce over IP
- Dichtefunktionaluntersuchungen zur Reaktivitat von non-IPR-Fullerenen
Extra info for Adaptive real-time anomaly detection for safeguarding critical networks
Cyber layer. This is the computers, networks and data gathering sensors that are used to monitor and control the physical layer. In the telecommunications domain, the cyber infrastructure is used to monitor and control the many routers and switches within the system. In the electricity domain, the cyber infrastructure gathers information about power flows and breaker states and transmits the operators’ control signals to the breakers and transformers. Although the cyber layer may share communications channels with the physical layer - in telecommunications, for example - the data that is transmitted within the cyber layer has a very different function from that within the physical layer.
Have new versions and bug-fixes been released recently? • Security - What techniques are used to secure the agents? • Interoperability - Can external software be integrated? • Scalability - Can the platform manage large applications with many agents? T HE S AFEGUARD CONTEXT 37 • Footprint - Are the memory and CPU usages reasonable? Can both lightweight and heavyweight agents be implemented with the platform? • Platform requirements - Does the platform depend on specific operating systems and/or hardware?
Comparing agents to objects, two important differences in general are: • Autonomy - The object has state and so does the agent but the agent also incorporates the ability to initiate actions as what could be explained as having behaviours. • Independence - In addition to having behaviours the agent is also communicating by passing messages. When using objects the communication is accomplished through method invocation with references. 3. S OFTWARE AGENTS the control lies with the invoker, which is totally opposite the agent case where control lies with the receiver.