Abstract
Behavior evaluation is an approach to the problem of the detection of intruders that are undesirable in the computer system. Considering multi–agent architecture each agent should execute continuous and autonomous behavior evaluation of other agents existing in the environment of the secured system. This means that an agent is evaluated separately by all agents in the environment. The distributed character of behavior evaluation in multi–agent system requires an algorithm of management and collection of the results of autonomous behavior evaluations of agents. The algorithm of results’ collection should enable to elect the worst agent or agents which have to be eliminated. The main topic of this article is a modified approach to the behavior evaluation process. This approach reduces the number of evaluations which have to be done by agents. The main idea is to evaluate only sampled actions (e.g. every second action) which are undertaken by agents in the secured system.
This work was partially supported by AGH founds — grant no 11.11.110.660.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cetnarowicz, K.: M–agent architecture based method of development of multiagent systems. In: Proc. of the 8th Joint EPS-APS International Conference on Physics Computing, ACC Cyfronet, Kraków (1996)
Cetnarowicz, K., Nawarecki, E., Rojek, G.: Behavior Based Detection of Unfavorable Events Using the Multiagent System, in Monitoring, Security, and Rescue Techniques in Multiagent Systems. Advances in Soft Computing, pp. 579–588. Springer, Heidelberg (2005)
Cetnarowicz, K., Nawarecki, E., Żabińska, M.: M–agent Architecture and its Application to the Agent Oriented Technology. In: Proc. of the DAIMAS 1997, St. Petersburg (1997)
Cetnarowicz, K., Rojek, G.: Unfavourable Beahvior Detection with the Immunological Approach. In: Proc. of the XXVth International Autumn Colloquium ASIS 2003, MARQ, Ostrava, pp. 41–46 (2003)
Cetnarowicz, K., Cieciwa, R., Rojek, G.: Behavior Based Detection of Unfavorable Activities in Multi–Agent Systems. In: MCPL, Conference on Management and Control of Production and Logistics, Santiago - Chile, pp. 325–330 (2004)
Cetnarowicz, K., Rojek, G.: Behavior Based Detection of Unfavorable Resources. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol. 3038, pp. 607–614. Springer, Heidelberg (2004)
Forrest, S., Hofmeyer, S.A., Somayaji, A.: Computer Immunology. Communications of the ACM 40(10), 88–96 (1997)
Forrest, S., Allen, L., Perelson, A.S., Cherukuri, R.: Self-Nonself Discrimination in a Computer. In: Proc. of the 1994 IEEE Symposium on Research in Security and Privacy, pp. 202–212. IEEE Computer Society Press, Los Alamitos (1994)
Rojek, G., Cięciwa, R., Cetnarowicz, K.: Algorithm of Behavior Evaluation in Multi-agent System. In: Sunderam, V.S., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2005. LNCS, vol. 3516, pp. 711–718. Springer, Heidelberg (2005)
Wierzchoń, S.: Artificial Immune Systems [in polish], Akademicka Oficyna Wydawnicza EXIT, Warszawa (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cetnarowicz, K., Cięciwa, R., Rojek, G. (2005). Behavior Evaluation with Actions’ Sampling in Multi-agent System. In: Pěchouček, M., Petta, P., Varga, L.Z. (eds) Multi-Agent Systems and Applications IV. CEEMAS 2005. Lecture Notes in Computer Science(), vol 3690. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11559221_49
Download citation
DOI: https://doi.org/10.1007/11559221_49
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29046-9
Online ISBN: 978-3-540-31731-9
eBook Packages: Computer ScienceComputer Science (R0)