Intrusion Detection in Open Peer-to-Peer Multi-Agent Systems
نویسندگان
چکیده
One way to build large-scale autonomous systems is to develop open peer-to-peer architectures in which peers are not pre-engineered to work together and in which peers themselves determine the social norms that govern collective behaviour. A major practical limitation to such systems is security because the very openness of such systems negates most traditional security solutions. We propose a programme of research that addresses this problem by devising ways of attack detection and damage limitation that take advantage of social norms described by electronic institutions. We have analysed security issues of open peer-to-peer multi-agent systems and focused on probing attacks against confidentiality. We have proposed a framework and adapted an inference system, which shows the possibility of private information disclosure by an adversary. We shall suggest effective countermeasures in such systems and propose attack response techniques to limit possible damages.
منابع مشابه
Multi-agent Peer-to-Peer Intrusion Detection
Ever increasing use of heterogeneous networks including mobile devices and ad-hoc sensor networks signifies the role of such information system properties as openness, autonomy, cooperation, coordination, etc. Agent-based service-oriented Peer-to-Peer (P2P) architecture provides attractive (if not single) design and implementation paradigm for such systems. This trend implies coherent evolution...
متن کاملEnhancing the Survivability of Intrusion Detection Agents through Port Switching and Peer-to-peer Replication
Security applications such as intrusion detection software often lack a security-conscious design that supports their vigilance goal. Similarly, software generation tools and libraries typically lack security constructs that support the development more robust systems. The latter is the case of agent-generation frameworks, which are rarely designed to guarantee agents a safe, continuous functio...
متن کاملSHOMAR: An Open Architecture for Distributed Intrusion Detection Services
Distributed Intrusion Detection Systems (DIDS) offer an alternative to centralized intrusion detection. Current research indicates that a distributed intrusion detection paradigm may afford greater coverage, consequently providing an increase in security. In some cases, DIDS offer an alternative to centralized analysis, consequently improving scalabity. SHOMAR, the distributed architecture pres...
متن کاملPeer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
The complexity of modern network architectures and the epidemic diffusion of malware require collaborative approaches for defense. We present a novel distributed system where each component collaborates to the intrusion and malware detection and to the dissemination of the local analyses. The proposed architecture is based on a decentralized, peer-to-peer and sensor-agnostic design that address...
متن کاملCollaborative Intrusion Detection Framework: Characteristics, Adversarial Opportunities and Countermeasures
Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information frommultiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Sy...
متن کامل