A Dynamic Trust Model for the Multi-agent Systems

Internet provides a fertile medium for new breeds of computer viruses. Many people who have access to a wealth of information via Internet are attacked by more computer viruses than they can effectively process. We present a dynamic computer virus detection model that can detect known viruses and previously unknown viruses to prevent information systems from damage. This model is inspired by biological immune systems that protect the body against damage from pathogens. The architecture of this model, the formal definitions of self nonself antigen, antibody, and vaccine gene library are introduced. Furthermore, the evolution of self and nonself, the generation of the antibody, the evolution of the virus vaccine gene, and the detection of the antigen are depicted. Experiment results show that this model has better capacity of self-adaptability and self-learning in detecting unknown viruses than traditional models.

[1]  NICHOLAS R. JENNINGS,et al.  An agent-based approach for building complex software systems , 2001, CACM.

[2]  R. May,et al.  How Viruses Spread Among Computers and People , 2001, Science.

[3]  Nicholas R. Jennings,et al.  An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.

[4]  Leonard M. Adleman,et al.  An Abstract Theory of Computer Viruses , 1988, CRYPTO.

[5]  Jeffrey O. Kephart,et al.  A biologically inspired immune system for computers , 1994 .

[6]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[7]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[8]  Li Xiao Research on Dynamic Trust Model for Large Scale Distributed Environment , 2007 .

[9]  Mudhakar Srivatsa,et al.  TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.

[10]  Gary B. Lamont,et al.  A distributed architecture for an adaptive computer virus immune system , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).

[11]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[12]  Mark E. J. Newman,et al.  Technological Networks and the Spread of Computer Viruses , 2004, Science.

[13]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[14]  Sarvapali D. Ramchurn,et al.  Trust in multi-agent systems , 2004, The Knowledge Engineering Review.

[15]  Steve R. White,et al.  Fighting Computer Viruses , 1997 .

[16]  A. Jøsang,et al.  Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .

[17]  Munindar P. Singh,et al.  Formal Trust Model for Multiagent Systems , 2007, IJCAI.

[18]  Wonil Kim,et al.  Biologically Inspired Computer Virus Detection System , 2004, BioADIT.

[19]  Tao Li,et al.  An Immune-Based Model for Computer Virus Detection , 2005, CANS.

[20]  Nahid Shahmehri,et al.  Dynamic trust metrics for peer-to-peer systems , 2005, 16th International Workshop on Database and Expert Systems Applications (DEXA'05).

[21]  Stephanie Forrest,et al.  An immunological model of distributed detection and its application to computer security , 1999 .

[22]  Chang Jun DyTrust: A Time-Frame Based Dynamic Trust Model for P2P Systems , 2006 .

[23]  Catholijn M. Jonker,et al.  Formal Analysis of Models for the Dynamics of Trust Based on Experiences , 1999, MAAMAW.

[24]  Eugene H. Spafford,et al.  Computer Viruses--A Form of Artificial Life? , 1990 .

[25]  S. R. Subramanya,et al.  Computer viruses , 2001 .

[26]  Eugene H. Spafford,et al.  Happy Birthday, Dear Viruses , 2007, Science.

[27]  Nicholas R. Jennings,et al.  TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.

[28]  Peter Szor,et al.  Fighting Computer Virus Attacks , 2004, USENIX Security Symposium.

[29]  Fred Cohen,et al.  Computer viruses—theory and experiments , 1990 .

[30]  Jeffrey O. Kephart,et al.  Biologically Inspired Defenses Against Computer Viruses , 1995, IJCAI.

[31]  Y. Radai Checksumming Techniques for Anti-Viral Purposes , 1992, IFIP Congress.