Intrusion Detection in Open Peer-to-Peer Multi-Agent Systems

被引:0
|
作者
Bijani, Shahriar [1 ]
Robertson, David [1 ]
机构
[1] Univ Edinburgh, Informat Sch, 10 Crichton St, Edinburgh, Midlothian, Scotland
来源
MANAGING THE DYNAMICS OF NETWORKS AND SERVICES | 2011年 / 6734卷
关键词
Security; Confidentiality; Multi-agent Systems; Electronic Institutions; P2P networks; Light Weight Coordination Calculus (LCC);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One way to build large-scale autonomous systems is to develop open peer-to-peer architectures in which peers are not pre-engineered to work together and in which peers themselves determine the social norms that govern collective behaviour. A major practical limitation to such systems is security because the very openness of such systems negates most traditional security solutions. We propose a programme of research that addresses this problem by devising ways of attack detection and damage limitation that take advantage of social norms described by electronic institutions. We have analysed security issues of open peer-to-peer multi-agent systems and focused on probing attacks against confidentiality. We have proposed a framework and adapted an inference system, which shows the possibility of private information disclosure by an adversary. We shall suggest effective countermeasures in such systems and propose attack response techniques to limit possible damages.
引用
收藏
页码:177 / 180
页数:4
相关论文
共 50 条
  • [21] Multi-Agent Architecture for Peer-to-Peer Electricity Trading based on Blockchain Technology
    Mezquita, Yeray
    Gazafroudi, Amin Shokri
    Corchado, J. M.
    Shafie-khah, Miadreza
    Laaksonen, Hannu
    Kamisalic, Aida
    2019 XXVII INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND AUTOMATION TECHNOLOGIES (ICAT 2019), 2019,
  • [22] Multi-agent interaction technology for peer-to-peer computing in electronic trading environments
    Purvis, M
    Nowostawski, M
    Cranefield, S
    Oliveira, M
    AGENTS AND PEER-TO-PEER COMPUTING, 2004, 2872 : 150 - 161
  • [23] Integrating Peer-to-Peer and Multi-agent Technologies for the Realization of Content Sharing Applications
    Poggi, Agostino
    Tomaiuolo, Michele
    INFORMATION RETRIEVAL AND MINING IN DISTRIBUTED ENVIRONMENTS, 2010, 324 : 93 - 107
  • [24] Anomaly intrusion detection methods for peer-to-peer system
    Tian, Daxin
    Liu, Yanheng
    Li, Bin
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 127 - +
  • [25] Peer-to-Peer Based Intrusion Detection Modeling and Analysis
    Zhang Xiaosong
    Chen Ting
    Ma Yue
    Li Hua
    2009 FIRST INTERNATIONAL CONFERENCE ON FUTURE INFORMATION NETWORKS, 2009, : 213 - +
  • [26] Peer-to-Peer Control for Networked Microgrids: Multi-Layer and Multi-Agent Architecture Design
    Wang, Yu
    Nguyen, Tung-Lam
    Xu, Yan
    Tran, Quoc-Tuan
    Caire, Raphael
    IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (06) : 4688 - 4699
  • [27] Robustness challenges in peer-to-peer agent systems
    Shehory, O
    AGENTS AND PEER-TO-PEER COMPUTING, 2004, 2872 : 13 - 22
  • [28] Indra: A peer-to-peer approach to network intrusion detection and prevention
    Janakiraman, R
    Waldvogel, M
    Zhang, Q
    TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 226 - 231
  • [29] Mean-Field Multi-Agent Reinforcement Learning for Peer-to-Peer Multi-Energy Trading
    Qiu, Dawei
    Wang, Jianhong
    Dong, Zihang
    Wang, Yi
    Strbac, Goran
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2023, 38 (05) : 4853 - 4866
  • [30] A multi-agent reinforcement learning approach for investigating and optimising peer-to-peer prosumer energy markets
    May, Ross
    Huang, Pei
    APPLIED ENERGY, 2023, 334