Skip to main content

An Immunological and an Ethically-social Approach to Security Mechanisms in a Multiagent System

  • Conference paper
Intelligent Information Processing and Web Mining

Part of the book series: Advances in Soft Computing ((AINSC,volume 35))

  • 600 Accesses

Abstract

This article presents a discussion about security mechanisms in agent and multiagent systems. Presented discussion focuses on the design of an artificial immune system for intrusion detection in agent systems. An immunological approach to change detection seems very useful in design of security mechanisms for an agent functioning in his environment. Reasons for this expectation are the principles of a computer immune system such as distribution and autonomy. Mentioned principles of artificial immune systems are strongly connected with main principles of agent technology which are the autonomy of an agent and distribution in the case of multiagent system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1. Aickelin, U., Cayzer, S., (2002) The Danger Theory and Its Application to Artificial Immune Systems. In Proceedings 1st International Conference on Artificial Immune Systems (ICARIS - 2002), Canterbury, 141–148

    Google Scholar 

  2. 2. Cetnarowicz, K., Ciêciwa, R., Nawarecki E., Rojek, G. (2005) Unfavorable Behavior Detection in Real World Systems Using the Multiagent System, In Intelligent Information Processing and Web Mining, Proceedings of the International IIS: IIPWM'05 Conference, Springer-Verlag Berlin Heidelberg, 416–420

    Google Scholar 

  3. 3. Cetnarowicz, K., Ciêciwa, R., Rojek, G. (2005) Behavior Evaluation with Actions' Sampling in Multi-agent System, In Lecture Notes in Artificial Intelligence, Vol. 3690, Springer-Verlag Berlin Heidelberg, 490–499

    Google Scholar 

  4. 4. Cetnarowicz, K., Rojek, G. (2004) Behavior Based Detection of Unfavorable Resources. In Lecture Notes in Computer Science, Vol. 3038, Springer-Verlag Berlin Heidelberg, 607–614

    Google Scholar 

  5. 5. Forrest, S., Perelson, A. S., Allen L., Cherukuri R. (1994) Self-nonself Discrimination in a Computer. In Proc. of the 1994 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, 202–212

    Google Scholar 

  6. 6. Hofmeyr, S. A., Forrest, S. (2002) Architecture for an Artificial Immune System. Evolutionary Computation, vol. 7, no. 1, 45–68

    Google Scholar 

  7. 7. Kagal L., Joshi A., Finin T. (2002) Developing Secure Agent Systems Using Delegation Based Trust Management. In Security of Mobile MultiAgent Systems (SEMAS 02) held at Autonomous Agents and MultiAgent Systems (AAMAS 02), available at: http://citeseer.ist.psu.edu/kagal02developing.html

    Google Scholar 

  8. 8. Matzinger, P. (1994) Tolerance Danger and the Extended Family, In Annual Reviews of Immunology, Vol. 12, 991–104

    Google Scholar 

  9. 9. Matzinger, P. (2002) The Danger Model: A Renewed Sense of Self, In Science Vol. 296. no. 5566, 301–305

    Article  Google Scholar 

  10. 10. Rojek, G., Cięciwa, R., Cetnarowicz, K. (2005) Algorithm of Behavior Evaluation in Multi-agent System, In Lecture Notes in Computer Science, Vol. 3516, Springer-Verlag Berlin Heidelberg, 711–718

    Google Scholar 

  11. 11. Somayaji, A., Hofmeyr, S., Forrest, S. (1998) Principles of a Computer Immune System, in Meeting on New Security Paradigms, 23–26 Sept. 1997, Langdale, UK, New York, NY, USA : ACM, 75–82

    Google Scholar 

  12. 12. Sycara K., Paolucci M., van Velsen M., Giampapa J. (2001) The RETSINA MAS Infrastructure, Technical Report CMU-RI-TR-01-05, Robotics Institute Technical Report, Carnegie Mellon

    Google Scholar 

  13. 13. Sycara K., Wong H.C. (1999) Adding Security and Trust to Multi-Agent Systems. In Proceedings of Autonomous Agents '99 Workshop on Deception, Fraud, and Trust in Agent Societies, May, 1999, 149–161

    Google Scholar 

  14. 14. Wierzchoń, S. T. (2001) Sztuczne systemy immunologiczne: teoria i zastosowania. Akademicka Oficyna Wydawnicza Exit, Warszawa

    Google Scholar 

  15. 15. Wooldridge, M., Jennings, N. R. (1997) Intelligent agents: Theory and practice. The Knowledge Engineering Review, 10(2), 115–152

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer

About this paper

Cite this paper

Cetnarowicz, K., Cięciwa, R., Rojek, G. (2006). An Immunological and an Ethically-social Approach to Security Mechanisms in a Multiagent System. In: Kłopotek, M.A., Wierzchoń, S.T., Trojanowski, K. (eds) Intelligent Information Processing and Web Mining. Advances in Soft Computing, vol 35. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-33521-8_2

Download citation

  • DOI: https://doi.org/10.1007/3-540-33521-8_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33520-7

  • Online ISBN: 978-3-540-33521-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics