Multi-agent systems for protecting critical infrastructures: A survey
نویسنده
چکیده
Multi-agent systems have emerged as a very significant platform in provisioning distributed and collaborative services to critical applications. Such applications require ubiquitous agent presence in the environment for monitoring, collecting data, communication, and subsequent data analysis, where the sensitivity of the application’s nature cannot be understated. Recent advances in the field of autonomous, ubiquitous, intelligent and distributed computing have led to corresponding developments in the use of collaborating multi-agents to protect critical infrastructures. Such systems have witnessed crucial demand for deployment in diverse application scenarios such as E-commerce, E-health, Network Intrusion Detection, Telematics and Transport Systems, Environmental Monitoring, as well as for distributed information processing in general. Critical infrastructures have longed for a distributed system in place for their uninterrupted and accurate operations. Multi-agents have provided one such approach towards addressing the issue of protecting such infrastructures through collaborative and distributed information processing. In this paper, a state-of-the-art on the use of multi-agent based systems for protecting five most common critical infrastructures, is presented. & 2012 Elsevier Ltd. All rights reserved.
منابع مشابه
Applying Cougaar to Integrated Critical Infrastructure Modeling and Simulation
Protecting critical infrastructures, such as electrical power grids, has become a significant concern for many nation states in recent years. Increasing attention is being given to the problem of infrastructure modeling, in order to help identify and redress potential vulnerabilities. Understanding critical infrastructure behavior involves modeling not only individual infrastructures, but also ...
متن کاملApplying Cougaar to Integrated Critical Infrastructure
Protecting critical infrastructures, such as electrical power grids, has become a significant concern for many nation states in recent years. Increasing attention is being given to the problem of infrastructure modeling, in order to help identify and redress potential vulnerabilities. Understanding critical infrastructure behavior involves modeling not only individual infrastructures, but also ...
متن کاملA Distributed, Multi-Agent Approach to Reactive Network Resilience
Critical network infrastructures are communication networks whose disruption can create a severe impact on other systems. Multi-agent systems have been successfully used to protect critical network infrastructures, with approaches ranging from reasoning about secure design and policies to multi-agent intrusion detection systems (IDS). However, there is little research on the possibilities for m...
متن کاملAgent-based modelling to identify possible measures in case of Critical Infrastructure disruption
Understanding critical infrastructures and in particular protecting them in case of natural or man-made threats or disasters is the objective of our research. As use case, the security of the power supply in the year 2030 for the city of Karlsruhe was selected. This scenario contains interdependencies between the electrical power grid and IT components as well as critical infrastructures such a...
متن کامل. The Challenge: Enabling Robust Open Multi-Agent Systems
substantially improved performance compared to existing approaches in a way that is appropriate for open multi-agent systems. 1. The Challenge: Enabling Robust Open Multi-Agent Systems " Open systems ... represent arguably the most important application for multi-agent systems" [1] This paper addresses one simple question: how can we develop robust multi-agent systems out of the often unreliabl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Network and Computer Applications
دوره 35 شماره
صفحات -
تاریخ انتشار 2012