SlideShare una empresa de Scribd logo
1 de 17
Multi Agent Based De-Centralized
               Knowledge Discovery and Agent
                      Security: A Review

                                      Presentation by:
                                      Aman Kumar
                                      M.tech -CSE (2nd Sem)
                                     Graphic Era University,
                                      Dehradun,India
May 26, 2012                                                   1
Agenda
    Introduction
    Data Mining Vs. De-Centralized Data Mining
    Agent, Why Agent?
    Agent Based De-Centralized Data Mining
    MADM Systems-An Architectural Approach
    Advantages of MADM
    Agents Security Issues
    Security measures for agent
    Future Scope
    Summary
    References

May 26, 2012                                      2
Introduction

    Data Mining-KDD
    De-Centralized Environment
    De-Centralized KDD(DDM)
    An Agent
    Multi Agent System




May 26, 2012                      3
Data Mining
      General   Data Mining Model


                       Data Mining   Data
                       Tools         Warehouse




May 26, 2012                                     4
Distributed Data Mining
       De-Centralized        Data Mining model


                         Local Model Aggregation                 Final Model



               Local                                Local         Local
               Model                                Model         Model




               Data Mining                         Data Mining   Data Mining
               Algorithm                           Algorithm     Algorithm




May 26, 2012                                                                   5
                Site k                               Site 2        Site 1
Agent , Why Agent?
   An Software Agent is as user’s personal
    assistant .
   Agent can be programmed as compact as
    possible.
   Light weight agent can transmitted across the
    network rather than data that is more bulky.
   The Designing of DDM Systems Deals With
        Great Details of Algorithms used
        Reusability
        Extensibility
        Robustness

   Hence , the agent characteristics are desirable
    to use in DDM.
May 26, 2012                                          6
Agent Based DDM
              ADDM system concerns three keys characteristics

                    Interoperability
                    Dynamic Configuration
                    Performance Aspects

              Application’s of distributed data mining include credit card
               Authentication, intrusion detection and all this type general
               and security related applications.
              Into this a novel Data Mining Technique inherits the
               properties of agents.
              The DDM applications can be further enhanced with agents.
              Better Integration policy with the communication protocols
              Provide a view of online parallel processing


May 26, 2012                                                                   7
Basic Components of ADDM
              An ADDM system can be generalized into a set of
               components




                                                   Application
                                                   Layer


                                                  Data Mining
                                                  Layer



                                                  Agent Grid
                                                  Infrastructure
                                                  Layer

                   Fig. Overview of ADDM
May 26, 2012                                                       8
MADM Systems-
 An Architectural Approach
         MADM is the ADDM but equipped with several agents which
          have particular goal of functionality as:

         Resource Agent: Maintaining Meta Data Information
         Local Task Agent: Located at the local site
         Broker Agent: Working as Advisor agent
         Query Agent: KDD System Agent
         Pre-Processing Agent: Preparing data for mining
         Post Data Agent: Evaluates the performance and accuracy
         Result Agent: Aggregate the all local results
         Interface Agent: Provide Interface to the real world
          applications
         Mobile Agent: Migrate based on Request and Response

May 26, 2012                                                        9
MADM Systems-An Architectural
Approach contd….




                       Data Source
                       On Different
May 26, 2012
                       Sites          10
Agent Security Issues
    Identification and authentication
    Authorization and delegation
    Communication
     • confidentiality: assurance that communicated information is not
        accessible to unauthorised parties;
     • data integrity: assurance that communicated information cannot be
     manipulated by unauthorised parties without being detected;
     • availability: assurance that communication reaches its intended
     recipient in a timely fashion;
     • non-repudiation: assurance that the originating entity can be held
     responsible for its communications.
    Mobility
    Situated ness
    Autonomy
    Agent Execution

May 26, 2012                                                                11
Security Measures for agent
    Protecting agents
    Trusted hardware
    Trusted nodes
    Co-operating agents
    Execution tracing
    Encrypted payload
    Environmental key generation
    Computing with encrypted functions
    Un-detachable signatures




May 26, 2012                              12
Security Measures ……
    Protecting the agent platform

    Sandboxing and safe code interpretation
    Proof carrying code
    Signed code
    Path histories

     State appraisal




May 26, 2012                                   13
Future Scope
        Data Mining and web mining is the hot area of research
        Integration of KDD and Agent technology can provide a new
         way to both
        For several network security researchers it can provide
         several new way to find the fraud in the network as provide
         fast discovery
         Real time confidential transaction can be make secure by
         the integration of Agent Technology




May 26, 2012                                                           14
Summary

         This presentation presented an overview of :-
            Data Mining

            Distributed Data Mining

            Agent Based DDM

            MADM systems as survey based on the information that
             are exist today.
            common components between these systems and gives a
             description to their strategies and architecture.
            Security Measures For Agents

         This presentation shows the integrated architectural model
         of distributed data mining and the agent technology, which
         provide a optimized performance to the knowledge
         discovery when the data is not resides in a central site or
         scattered over the network.
May 26, 2012                                                           15
References
          [1] IJRIC ISSN: 2076-3328 www.ijric.org E-ISSN: 2076-3336 “. Agent based distributed data
          mining: AN OVER VIEW “VUDA SREENIVASA RAO, 2009-2010
         [2] M. Klusch, S. Lodi, G. Moro. Agent-based Distributed Data Mining: The KDEC Scheme.
          Intelligent Information Agents - The AgentLink Perspective. Lecture Notes in Computer Science 2586
          Springer 2003.
         [3] “Distributed Data Mining and Agents” Josenildo C. da Silva, Chris Giannella, Ruchita Bhargava,
          Hillol Kargupta1;, and Matthias Klusch
         [4] Y. Xing, M.G. Madden, J. Duggan, G. Lyons. A Multi-Agent System for Context-based Distributed
          Data Mining. Technical Report Number NUIG-IT-170503, Department of Information Technology,
          NUI, Galway, 2003.
         [5] “Agent-Based Data-Mining” Winton Davies 15 August 1994
         [6] Priyanka Makkar et. al. / (IJCSE) International Journal on Computer Science and Engineering
          Vol. 02, No. 04, 2010, 1237-1244 DISTRIBUTED DATA MINING AND MINING MULTI-AGENT
          DATA ,Vuda Sreenivasa Rao, Dr. S Vidyavathi
         [7] V. Gorodetsky and I. Kotenko. “The Multiagent Systems for Computer Network Security
          Assurance: frameworks and case studies.” In IEEE International Conference on Artificial Intelligence
          Systems, 2002, pages 297–302, 2002.
         [8] International Journal of Computer Applications (0975 – 8887) Volume 4– No.12, August 2010
         23 “A Comparative study of Multi Agent Based and High- Performance Privacy Preserving Data
          Mining”, Md Faizan Farooqui, Md Muqeem, Dr. Md Rizwan Beg
         [9] Future Generation Computer Systems 23 (2007) 61–68 ,www.elsevier.com/locate/fgcs
          “Distributed data mining on Agent Grid: Issues, platform and development toolkit” Jiewen Luoa,b,_,
          Maoguang Wangc, Jun Hud, Zhongzhi Shia
         [10] Sung W. Baik, Jerzy W. Bala, and Ju S. Cho. Agent based distributed data mining. Lecture
          Notes in Computer Science, 3320:42–45, 2004.
         [11]Xining Li and Jingbo Ni. Deploying mobile agents in distributed data mining. Lecture Notes in
          Computer Science 4819:322–331, 2007 .
May 26, 2012                                                                                                     16
    [12]“Mobile agent security” Niklas Borselius Mobile VCE Research Group Information Security Group,
    Royal Holloway, University of London Egham, Surrey, TW20 0EX, UK ,Niklas.Borselius@rhul.ac.uk
Thank You



May 26, 2012               17

Más contenido relacionado

La actualidad más candente

AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Agent-Driven Distributed Data Mining
Agent-Driven Distributed Data MiningAgent-Driven Distributed Data Mining
Agent-Driven Distributed Data MiningEditor IJCATR
 
SAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsSAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsEswar Publications
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...ijccsa
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework forIJCNCJournal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...AIRCC Publishing Corporation
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud DrainEswar Publications
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
Incentive based DDoS defense
Incentive based DDoS defenseIncentive based DDoS defense
Incentive based DDoS defenseG Prachi
 

La actualidad más candente (16)

AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Agent-Driven Distributed Data Mining
Agent-Driven Distributed Data MiningAgent-Driven Distributed Data Mining
Agent-Driven Distributed Data Mining
 
SAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsSAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS Clouds
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework for
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
Incentive based DDoS defense
Incentive based DDoS defenseIncentive based DDoS defense
Incentive based DDoS defense
 

Similar a Distributed Datamining and Agent System,security

Agent based frameworks for distributed association rule mining an analysis
Agent based frameworks for distributed association rule mining  an analysis  Agent based frameworks for distributed association rule mining  an analysis
Agent based frameworks for distributed association rule mining an analysis ijfcstjournal
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGDDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGIJCI JOURNAL
 
Distributed Data mining using Multi Agent data
Distributed Data mining using Multi Agent dataDistributed Data mining using Multi Agent data
Distributed Data mining using Multi Agent dataIRJET Journal
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...AJASTJournal
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Associate Professor in VSB Coimbatore
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewIRJET Journal
 
IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 

Similar a Distributed Datamining and Agent System,security (20)

11 vol3
11 vol311 vol3
11 vol3
 
Agent based frameworks for distributed association rule mining an analysis
Agent based frameworks for distributed association rule mining  an analysis  Agent based frameworks for distributed association rule mining  an analysis
Agent based frameworks for distributed association rule mining an analysis
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGDDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
 
Distributed Data mining using Multi Agent data
Distributed Data mining using Multi Agent dataDistributed Data mining using Multi Agent data
Distributed Data mining using Multi Agent data
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED-V2I1P2
IJSRED-V2I1P2
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 

Último

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 

Último (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Distributed Datamining and Agent System,security

  • 1. Multi Agent Based De-Centralized Knowledge Discovery and Agent Security: A Review Presentation by: Aman Kumar M.tech -CSE (2nd Sem) Graphic Era University, Dehradun,India May 26, 2012 1
  • 2. Agenda  Introduction  Data Mining Vs. De-Centralized Data Mining  Agent, Why Agent?  Agent Based De-Centralized Data Mining  MADM Systems-An Architectural Approach  Advantages of MADM  Agents Security Issues  Security measures for agent  Future Scope  Summary  References May 26, 2012 2
  • 3. Introduction  Data Mining-KDD  De-Centralized Environment  De-Centralized KDD(DDM)  An Agent  Multi Agent System May 26, 2012 3
  • 4. Data Mining General Data Mining Model Data Mining Data Tools Warehouse May 26, 2012 4
  • 5. Distributed Data Mining De-Centralized Data Mining model Local Model Aggregation Final Model Local Local Local Model Model Model Data Mining Data Mining Data Mining Algorithm Algorithm Algorithm May 26, 2012 5 Site k Site 2 Site 1
  • 6. Agent , Why Agent?  An Software Agent is as user’s personal assistant .  Agent can be programmed as compact as possible.  Light weight agent can transmitted across the network rather than data that is more bulky.  The Designing of DDM Systems Deals With  Great Details of Algorithms used  Reusability  Extensibility  Robustness  Hence , the agent characteristics are desirable to use in DDM. May 26, 2012 6
  • 7. Agent Based DDM  ADDM system concerns three keys characteristics  Interoperability  Dynamic Configuration  Performance Aspects  Application’s of distributed data mining include credit card Authentication, intrusion detection and all this type general and security related applications.  Into this a novel Data Mining Technique inherits the properties of agents.  The DDM applications can be further enhanced with agents.  Better Integration policy with the communication protocols  Provide a view of online parallel processing May 26, 2012 7
  • 8. Basic Components of ADDM  An ADDM system can be generalized into a set of components Application Layer Data Mining Layer Agent Grid Infrastructure Layer Fig. Overview of ADDM May 26, 2012 8
  • 9. MADM Systems- An Architectural Approach  MADM is the ADDM but equipped with several agents which have particular goal of functionality as:  Resource Agent: Maintaining Meta Data Information  Local Task Agent: Located at the local site  Broker Agent: Working as Advisor agent  Query Agent: KDD System Agent  Pre-Processing Agent: Preparing data for mining  Post Data Agent: Evaluates the performance and accuracy  Result Agent: Aggregate the all local results  Interface Agent: Provide Interface to the real world applications  Mobile Agent: Migrate based on Request and Response May 26, 2012 9
  • 10. MADM Systems-An Architectural Approach contd…. Data Source On Different May 26, 2012 Sites 10
  • 11. Agent Security Issues  Identification and authentication  Authorization and delegation  Communication • confidentiality: assurance that communicated information is not accessible to unauthorised parties; • data integrity: assurance that communicated information cannot be manipulated by unauthorised parties without being detected; • availability: assurance that communication reaches its intended recipient in a timely fashion; • non-repudiation: assurance that the originating entity can be held responsible for its communications.  Mobility  Situated ness  Autonomy  Agent Execution May 26, 2012 11
  • 12. Security Measures for agent  Protecting agents  Trusted hardware  Trusted nodes  Co-operating agents  Execution tracing  Encrypted payload  Environmental key generation  Computing with encrypted functions  Un-detachable signatures May 26, 2012 12
  • 13. Security Measures ……  Protecting the agent platform  Sandboxing and safe code interpretation  Proof carrying code  Signed code  Path histories  State appraisal May 26, 2012 13
  • 14. Future Scope  Data Mining and web mining is the hot area of research  Integration of KDD and Agent technology can provide a new way to both  For several network security researchers it can provide several new way to find the fraud in the network as provide fast discovery  Real time confidential transaction can be make secure by the integration of Agent Technology May 26, 2012 14
  • 15. Summary  This presentation presented an overview of :-  Data Mining  Distributed Data Mining  Agent Based DDM  MADM systems as survey based on the information that are exist today.  common components between these systems and gives a description to their strategies and architecture.  Security Measures For Agents  This presentation shows the integrated architectural model of distributed data mining and the agent technology, which provide a optimized performance to the knowledge discovery when the data is not resides in a central site or scattered over the network. May 26, 2012 15
  • 16. References  [1] IJRIC ISSN: 2076-3328 www.ijric.org E-ISSN: 2076-3336 “. Agent based distributed data mining: AN OVER VIEW “VUDA SREENIVASA RAO, 2009-2010  [2] M. Klusch, S. Lodi, G. Moro. Agent-based Distributed Data Mining: The KDEC Scheme. Intelligent Information Agents - The AgentLink Perspective. Lecture Notes in Computer Science 2586 Springer 2003.  [3] “Distributed Data Mining and Agents” Josenildo C. da Silva, Chris Giannella, Ruchita Bhargava, Hillol Kargupta1;, and Matthias Klusch  [4] Y. Xing, M.G. Madden, J. Duggan, G. Lyons. A Multi-Agent System for Context-based Distributed Data Mining. Technical Report Number NUIG-IT-170503, Department of Information Technology, NUI, Galway, 2003.  [5] “Agent-Based Data-Mining” Winton Davies 15 August 1994  [6] Priyanka Makkar et. al. / (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 04, 2010, 1237-1244 DISTRIBUTED DATA MINING AND MINING MULTI-AGENT DATA ,Vuda Sreenivasa Rao, Dr. S Vidyavathi  [7] V. Gorodetsky and I. Kotenko. “The Multiagent Systems for Computer Network Security Assurance: frameworks and case studies.” In IEEE International Conference on Artificial Intelligence Systems, 2002, pages 297–302, 2002.  [8] International Journal of Computer Applications (0975 – 8887) Volume 4– No.12, August 2010  23 “A Comparative study of Multi Agent Based and High- Performance Privacy Preserving Data Mining”, Md Faizan Farooqui, Md Muqeem, Dr. Md Rizwan Beg  [9] Future Generation Computer Systems 23 (2007) 61–68 ,www.elsevier.com/locate/fgcs “Distributed data mining on Agent Grid: Issues, platform and development toolkit” Jiewen Luoa,b,_, Maoguang Wangc, Jun Hud, Zhongzhi Shia  [10] Sung W. Baik, Jerzy W. Bala, and Ju S. Cho. Agent based distributed data mining. Lecture Notes in Computer Science, 3320:42–45, 2004.  [11]Xining Li and Jingbo Ni. Deploying mobile agents in distributed data mining. Lecture Notes in Computer Science 4819:322–331, 2007 . May 26, 2012 16 [12]“Mobile agent security” Niklas Borselius Mobile VCE Research Group Information Security Group, Royal Holloway, University of London Egham, Surrey, TW20 0EX, UK ,Niklas.Borselius@rhul.ac.uk
  • 17. Thank You May 26, 2012 17