Cookie Control

This site uses cookies to store information on your computer.

Some cookies on this site are essential, and the site won't work as expected without them. These cookies are set when you submit a form, login or interact with the site by doing something that goes beyond clicking on simple links.

By using our site you accept the terms of our Privacy Policy.

(One cookie will be set to store your preference)
(Ticking this sets a cookie to hide this popup if you then hit close. This will not store any personal information)

About this tool

About Cookie Control

You are here

Historical Interest Only

This is a static HTML version of an old Drupal site. The site is no longer maintained and could be deleted at any point. It is only here for historical interest.

Intrusion Detection in Open Peer-to-Peer Multi-agent Systems

TitleIntrusion Detection in Open Peer-to-Peer Multi-agent Systems
Publication TypeConference Proceedings
Year of Conference2011
AuthorsBijani, S, Robertson, D
Conference Name5th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2011)
Series TitleManaging the dynamics of networks and services
Conference Start Date13/06/2011
PublisherSpringer-Verlag Berlin
ISBN Number978-3-642-21483-7
Abstract

One way to build large-scale autonomous systems is to develop open peer-to-peer architectures in which peers are not pre-engineered to work together and in which peers themselves determine the social norms that govern collective behaviour. A major practical limitation to such systems is security because the very openness of such systems negates most traditional security solutions. We propose a programme of research that addresses this problem by devising ways of attack detection and damage limitation that take advantage of social norms described by electronic institutions. We have analysed security issues of open peer-to-peer multi-agent systems and focused on probing attacks against confidentiality. We have proposed a framework and adapted an inference system, which shows the possibility of private information disclosure by an adversary. We shall suggest effective countermeasures in such systems and propose attack response techniques to limit possible damages.

Full Text