Multi-agent systems for protecting critical infrastructures: A survey

نویسنده

  • Zubair A. Baig
چکیده

Multi-agent systems have emerged as a very significant platform in provisioning distributed and collaborative services to critical applications. Such applications require ubiquitous agent presence in the environment for monitoring, collecting data, communication, and subsequent data analysis, where the sensitivity of the application’s nature cannot be understated. Recent advances in the field of autonomous, ubiquitous, intelligent and distributed computing have led to corresponding developments in the use of collaborating multi-agents to protect critical infrastructures. Such systems have witnessed crucial demand for deployment in diverse application scenarios such as E-commerce, E-health, Network Intrusion Detection, Telematics and Transport Systems, Environmental Monitoring, as well as for distributed information processing in general. Critical infrastructures have longed for a distributed system in place for their uninterrupted and accurate operations. Multi-agents have provided one such approach towards addressing the issue of protecting such infrastructures through collaborative and distributed information processing. In this paper, a state-of-the-art on the use of multi-agent based systems for protecting five most common critical infrastructures, is presented. & 2012 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applying Cougaar to Integrated Critical Infrastructure Modeling and Simulation

Protecting critical infrastructures, such as electrical power grids, has become a significant concern for many nation states in recent years. Increasing attention is being given to the problem of infrastructure modeling, in order to help identify and redress potential vulnerabilities. Understanding critical infrastructure behavior involves modeling not only individual infrastructures, but also ...

متن کامل

Applying Cougaar to Integrated Critical Infrastructure

Protecting critical infrastructures, such as electrical power grids, has become a significant concern for many nation states in recent years. Increasing attention is being given to the problem of infrastructure modeling, in order to help identify and redress potential vulnerabilities. Understanding critical infrastructure behavior involves modeling not only individual infrastructures, but also ...

متن کامل

A Distributed, Multi-Agent Approach to Reactive Network Resilience

Critical network infrastructures are communication networks whose disruption can create a severe impact on other systems. Multi-agent systems have been successfully used to protect critical network infrastructures, with approaches ranging from reasoning about secure design and policies to multi-agent intrusion detection systems (IDS). However, there is little research on the possibilities for m...

متن کامل

Agent-based modelling to identify possible measures in case of Critical Infrastructure disruption

Understanding critical infrastructures and in particular protecting them in case of natural or man-made threats or disasters is the objective of our research. As use case, the security of the power supply in the year 2030 for the city of Karlsruhe was selected. This scenario contains interdependencies between the electrical power grid and IT components as well as critical infrastructures such a...

متن کامل

. The Challenge: Enabling Robust Open Multi-Agent Systems

substantially improved performance compared to existing approaches in a way that is appropriate for open multi-agent systems. 1. The Challenge: Enabling Robust Open Multi-Agent Systems " Open systems ... represent arguably the most important application for multi-agent systems" [1] This paper addresses one simple question: how can we develop robust multi-agent systems out of the often unreliabl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Network and Computer Applications

دوره 35  شماره 

صفحات  -

تاریخ انتشار 2012