Skip to main content

A Peer-to-Peer Blacklisting Strategy Inspired by Leukocyte-Endothelium Interaction

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3627))

Abstract

This paper describes a multi-agent strategy for blacklisting malicious nodes in a peer-to-peer network that is inspired by the innate immune system, including the recruitment of leukocytes to the site of an infection in the human body. Agents are based on macrophages, T-cells, and tumor necrosis factor, and exist on network nodes that have properties drawn from vascular endothelial tissue. Here I show that this strategy succeeds in blacklisting malicious nodes from the network using non-specific recruitment. This strategy is sensitive to parameters that affect the recruitment of leukocyte agents to malicious nodes. The strategy can eliminate even a large, uniform distribution of malicious nodes in the network.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abbas, A., Lichtman, A., Pober, J.: Cellular and Molecular Immunology, 4th edn. W.B. Saunders Company, Philadelphia (2000)

    Google Scholar 

  2. Babaoglu, O., Meling, H., Montresor, A.: Anthill: A framework for the development of agent-based peerto-peer systems. In: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, pp. 15–22 (2002)

    Google Scholar 

  3. Balakrishnan, R., Ranganathan, K.: Vertex Cuts and Edge Cuts. In: §3.1 in A Textbook of Graph Theory, p. 3. Springer, New York (1999)

    Google Scholar 

  4. Di Caro, G., Dorigo, M.: AntNet: Distributed Stigmergetic Control for Communications Networks. Journal of Artificial Intelligence Research 9, 317–365 (1998)

    MATH  Google Scholar 

  5. Dasgupta, P.: Incentive Driven Node Discovery in a Peer-to-Peer Network Using Mobile Intelligent Agents. In: Proceedings of the 7th International Conference on Artificial Intelligence, Las Vegas, June 2003, pp. 750–756 (2003)

    Google Scholar 

  6. Dorigo, M., Maniezzo, V., Colorni, A.: The Ant System: Optimization by a Colony of Cooperating Agents. IEEE Transactions on Systems, Man, and Cybernetics-Part B 26(1), 29–41 (1996)

    Article  Google Scholar 

  7. Jacob, C., Litorco, J., Lee, L.: Immunity Through Swarms: Agent-Based Simulations of the Human Immune System. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 400–412. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Jelasity, M., Montresor, A., Babaoglu, O.: Detection and removal of malicious peers in gossip-based protocols. In: 2nd Bertinoro Workshop on Future Directions in Distributed Computing: Survivability: Obstacles and Solutions (FuDiCo II: S.O.S.), Bertinoro, Italy (June 2004), invitation only workshop, proceedings online at http://www.cs.utexas.edu/users/lorenzo/sos/

  9. Lau, H.Y.K., Wong, V.W.K.: Immunologic Control Framework for Automated Material Handling. In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 57–68. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Milojicic, D., Kalogeraki, V., Lukose, R., Nagaraja, K., Pruyne, J., Richard, B., Rollins, S., Xu, Z.: Peer-to-peer computing, HP Technical Report, HPL-2002-57 (2002)

    Google Scholar 

  11. Mitchell, M.: An Introduction to Genetic Algorithms, p. 166. MIT Press, Cambridge (2001)

    Google Scholar 

  12. Nishiyama, H., Mizoguchi, F.: Design of Security System Based on Immune System. In: Proceedings of the 10th IEEE International Workshop on Enabling Technolgies: Infrastructure for Collaborative Enterprises, Massachusetts, pp. 138–143 (2001)

    Google Scholar 

  13. Pang, Y., Yan, Y., Yafei, H., Yiping, Z., Shiyong, Z.: Securing Ad Hoc Networks through mobile agent. In: Proceedings of the 3rd International Conference on Information Security, Shainghai, China, pp. 125–129 (2004)

    Google Scholar 

  14. Jelasity, M., Montresor, A., Jesi, G.P.: Peersim Peer-to-Peer Simulator, January 7 (2005), http://peersim.sourceforge.net

  15. Sathyanath, S., Sahin, F.: AISIMAM – An Artificial Immune System Based Intelligent Multi Agent Model and its Application to a Mine Detection Problem. In: Proceedings of ICARIS 2002: 1st International Conference on Artificial Immune Systems, University of Kent (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Trapnell, B.C. (2005). A Peer-to-Peer Blacklisting Strategy Inspired by Leukocyte-Endothelium Interaction. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds) Artificial Immune Systems. ICARIS 2005. Lecture Notes in Computer Science, vol 3627. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11536444_26

Download citation

  • DOI: https://doi.org/10.1007/11536444_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28175-7

  • Online ISBN: 978-3-540-31875-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics