The growth of a distributed processing system can increase both the number and likelihood of attacks it may be subject to over its lifetime 14, 7]. This fact, in addition to the complexity inherent in such an environment, makes the survivability of large heterogeneous systems one of the most challenging research areas currently being investigatedd1]. Our goal is to create a distributed simulation system to test various coordination mechanisms allowing the elements of the system to detect, react and adapt in the face of adverse working conditions. Our assumption is that the system is composed of a group of autonomous agents. Each agent has its own local view of the world and its own goals, but is capable of coordinating these goals with respect to remote agents. To simulate these complex systems, an environment is needed which permits the simulation of an agent's method execution. To this end, we are developing a distributed event-based simulator capable of simulating the eeects directed attacks or a capricious environment have on agent method execution and recovery.rized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright annotation thereon. Disclaimer: The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the oocial policies or endorsements, either expressed or implied, of the and the content of the information does not necessarily reeect the position or the policy of the Government, and no oocial endorsement should be inferred.
[1]
Karl N. Levitt,et al.
GrIDS A Graph-Based Intrusion Detection System for Large Networks
,
1996
.
[2]
Jeffrey S. Rosenschein,et al.
Communication-Free Interactions among Rational Agents: A Probabilistic Approach
,
1990,
Distributed Artificial Intelligence.
[3]
Victor R. Lesser,et al.
Issues in Automated Negotiation and Electronic Commerce: Extending the Contract Net Framework
,
1997,
ICMAS.
[4]
Victor Lesser,et al.
Learning Problem Solving Control in Cooperative Multi-Agent Systems*
,
1997
.
[5]
Jon A. Rochlis,et al.
With microscope and tweezers: an analysis of the Internet virus of November 1988
,
1989,
Proceedings. 1989 IEEE Symposium on Security and Privacy.
[6]
Victor Lesser,et al.
Environment Centered Analysis and Design of Coordination Mechanisms
,
1996
.
[7]
Victor R. Lesser,et al.
The Use of Meta-level Information in Learning Situation-Specific Coordination
,
1997,
IJCAI.
[8]
Victor R. Lesser,et al.
Designing a Family of Coordination Algorithms
,
1997,
ICMAS.
[9]
Victor R. Lesser,et al.
Complex Goal Criteria and Its Application in Design-to-Criteria Scheduling
,
1997,
AAAI/IAAI.
[10]
Victor Lesser,et al.
Quantitative Modeling of Complex Environments
,
1993
.
[11]
Jonathan D. Day,et al.
The New Economics of Organization
,
1998
.