Abstract
This article presents a discussion about security mechanisms in agent and multiagent systems. Presented discussion focuses on the design of an artificial immune system for intrusion detection in agent systems. An immunological approach to change detection seems very useful in design of security mechanisms for an agent functioning in his environment. Reasons for this expectation are the principles of a computer immune system such as distribution and autonomy. Mentioned principles of artificial immune systems are strongly connected with main principles of agent technology which are the autonomy of an agent and distribution in the case of multiagent system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
1. Aickelin, U., Cayzer, S., (2002) The Danger Theory and Its Application to Artificial Immune Systems. In Proceedings 1st International Conference on Artificial Immune Systems (ICARIS - 2002), Canterbury, 141–148
2. Cetnarowicz, K., Ciêciwa, R., Nawarecki E., Rojek, G. (2005) Unfavorable Behavior Detection in Real World Systems Using the Multiagent System, In Intelligent Information Processing and Web Mining, Proceedings of the International IIS: IIPWM'05 Conference, Springer-Verlag Berlin Heidelberg, 416–420
3. Cetnarowicz, K., Ciêciwa, R., Rojek, G. (2005) Behavior Evaluation with Actions' Sampling in Multi-agent System, In Lecture Notes in Artificial Intelligence, Vol. 3690, Springer-Verlag Berlin Heidelberg, 490–499
4. Cetnarowicz, K., Rojek, G. (2004) Behavior Based Detection of Unfavorable Resources. In Lecture Notes in Computer Science, Vol. 3038, Springer-Verlag Berlin Heidelberg, 607–614
5. Forrest, S., Perelson, A. S., Allen L., Cherukuri R. (1994) Self-nonself Discrimination in a Computer. In Proc. of the 1994 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, 202–212
6. Hofmeyr, S. A., Forrest, S. (2002) Architecture for an Artificial Immune System. Evolutionary Computation, vol. 7, no. 1, 45–68
7. Kagal L., Joshi A., Finin T. (2002) Developing Secure Agent Systems Using Delegation Based Trust Management. In Security of Mobile MultiAgent Systems (SEMAS 02) held at Autonomous Agents and MultiAgent Systems (AAMAS 02), available at: http://citeseer.ist.psu.edu/kagal02developing.html
8. Matzinger, P. (1994) Tolerance Danger and the Extended Family, In Annual Reviews of Immunology, Vol. 12, 991–104
9. Matzinger, P. (2002) The Danger Model: A Renewed Sense of Self, In Science Vol. 296. no. 5566, 301–305
10. Rojek, G., Cięciwa, R., Cetnarowicz, K. (2005) Algorithm of Behavior Evaluation in Multi-agent System, In Lecture Notes in Computer Science, Vol. 3516, Springer-Verlag Berlin Heidelberg, 711–718
11. Somayaji, A., Hofmeyr, S., Forrest, S. (1998) Principles of a Computer Immune System, in Meeting on New Security Paradigms, 23–26 Sept. 1997, Langdale, UK, New York, NY, USA : ACM, 75–82
12. Sycara K., Paolucci M., van Velsen M., Giampapa J. (2001) The RETSINA MAS Infrastructure, Technical Report CMU-RI-TR-01-05, Robotics Institute Technical Report, Carnegie Mellon
13. Sycara K., Wong H.C. (1999) Adding Security and Trust to Multi-Agent Systems. In Proceedings of Autonomous Agents '99 Workshop on Deception, Fraud, and Trust in Agent Societies, May, 1999, 149–161
14. Wierzchoń, S. T. (2001) Sztuczne systemy immunologiczne: teoria i zastosowania. Akademicka Oficyna Wydawnicza Exit, Warszawa
15. Wooldridge, M., Jennings, N. R. (1997) Intelligent agents: Theory and practice. The Knowledge Engineering Review, 10(2), 115–152
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer
About this paper
Cite this paper
Cetnarowicz, K., Cięciwa, R., Rojek, G. (2006). An Immunological and an Ethically-social Approach to Security Mechanisms in a Multiagent System. In: Kłopotek, M.A., Wierzchoń, S.T., Trojanowski, K. (eds) Intelligent Information Processing and Web Mining. Advances in Soft Computing, vol 35. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-33521-8_2
Download citation
DOI: https://doi.org/10.1007/3-540-33521-8_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33520-7
Online ISBN: 978-3-540-33521-4
eBook Packages: EngineeringEngineering (R0)