Abstract
This paper describes a multi-agent strategy for blacklisting malicious nodes in a peer-to-peer network that is inspired by the innate immune system, including the recruitment of leukocytes to the site of an infection in the human body. Agents are based on macrophages, T-cells, and tumor necrosis factor, and exist on network nodes that have properties drawn from vascular endothelial tissue. Here I show that this strategy succeeds in blacklisting malicious nodes from the network using non-specific recruitment. This strategy is sensitive to parameters that affect the recruitment of leukocyte agents to malicious nodes. The strategy can eliminate even a large, uniform distribution of malicious nodes in the network.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abbas, A., Lichtman, A., Pober, J.: Cellular and Molecular Immunology, 4th edn. W.B. Saunders Company, Philadelphia (2000)
Babaoglu, O., Meling, H., Montresor, A.: Anthill: A framework for the development of agent-based peerto-peer systems. In: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, pp. 15–22 (2002)
Balakrishnan, R., Ranganathan, K.: Vertex Cuts and Edge Cuts. In: §3.1 in A Textbook of Graph Theory, p. 3. Springer, New York (1999)
Di Caro, G., Dorigo, M.: AntNet: Distributed Stigmergetic Control for Communications Networks. Journal of Artificial Intelligence Research 9, 317–365 (1998)
Dasgupta, P.: Incentive Driven Node Discovery in a Peer-to-Peer Network Using Mobile Intelligent Agents. In: Proceedings of the 7th International Conference on Artificial Intelligence, Las Vegas, June 2003, pp. 750–756 (2003)
Dorigo, M., Maniezzo, V., Colorni, A.: The Ant System: Optimization by a Colony of Cooperating Agents. IEEE Transactions on Systems, Man, and Cybernetics-Part B 26(1), 29–41 (1996)
Jacob, C., Litorco, J., Lee, L.: Immunity Through Swarms: Agent-Based Simulations of the Human Immune System. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 400–412. Springer, Heidelberg (2004)
Jelasity, M., Montresor, A., Babaoglu, O.: Detection and removal of malicious peers in gossip-based protocols. In: 2nd Bertinoro Workshop on Future Directions in Distributed Computing: Survivability: Obstacles and Solutions (FuDiCo II: S.O.S.), Bertinoro, Italy (June 2004), invitation only workshop, proceedings online at http://www.cs.utexas.edu/users/lorenzo/sos/
Lau, H.Y.K., Wong, V.W.K.: Immunologic Control Framework for Automated Material Handling. In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 57–68. Springer, Heidelberg (2003)
Milojicic, D., Kalogeraki, V., Lukose, R., Nagaraja, K., Pruyne, J., Richard, B., Rollins, S., Xu, Z.: Peer-to-peer computing, HP Technical Report, HPL-2002-57 (2002)
Mitchell, M.: An Introduction to Genetic Algorithms, p. 166. MIT Press, Cambridge (2001)
Nishiyama, H., Mizoguchi, F.: Design of Security System Based on Immune System. In: Proceedings of the 10th IEEE International Workshop on Enabling Technolgies: Infrastructure for Collaborative Enterprises, Massachusetts, pp. 138–143 (2001)
Pang, Y., Yan, Y., Yafei, H., Yiping, Z., Shiyong, Z.: Securing Ad Hoc Networks through mobile agent. In: Proceedings of the 3rd International Conference on Information Security, Shainghai, China, pp. 125–129 (2004)
Jelasity, M., Montresor, A., Jesi, G.P.: Peersim Peer-to-Peer Simulator, January 7 (2005), http://peersim.sourceforge.net
Sathyanath, S., Sahin, F.: AISIMAM – An Artificial Immune System Based Intelligent Multi Agent Model and its Application to a Mine Detection Problem. In: Proceedings of ICARIS 2002: 1st International Conference on Artificial Immune Systems, University of Kent (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Trapnell, B.C. (2005). A Peer-to-Peer Blacklisting Strategy Inspired by Leukocyte-Endothelium Interaction. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds) Artificial Immune Systems. ICARIS 2005. Lecture Notes in Computer Science, vol 3627. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11536444_26
Download citation
DOI: https://doi.org/10.1007/11536444_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28175-7
Online ISBN: 978-3-540-31875-0
eBook Packages: Computer ScienceComputer Science (R0)