Co-operative Agents in Network Defence

The question addressed in this paper is how can complex information networks survive hostile attacks and what mechanisms can increase survivability and defence in large-scale computing networks. As recent evidence indicates, firms, governments and other organisations urgently require better defensive strategies in cyberspace, (Anderson et al 1999, and Briney 2000). In particular, the ability of an information network to maintain itself in the face of continuous perturbation also raises more complex issues related to system metabolism, and network topology.

[1]  Eugene H. Spafford,et al.  An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[2]  Eugene H. Spafford,et al.  Defending a Computer System Using Autonomous Agents , 1995 .

[3]  Joshua M. Epstein,et al.  Growing Artificial Societies: Social Science from the Bottom Up , 1996 .

[4]  Vasant Honavar,et al.  Intelligent agents for intrusion detection , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[5]  L. Segel,et al.  Immunology Viewed as the Study of an Autonomous Decentralized System , 1998 .

[6]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[7]  E. Wilson The Insect Societies , 1974 .

[8]  D. R. White,et al.  Social Cohesion and Embeddedness : A Hierarchical Conception of Social Groups , 2000 .

[9]  Referencemodel Andusecases Malicious-and Accidental-fault Tolerance for Internet Applications , .

[10]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[11]  Robert H. Guttman,et al.  Agents that Buy and Sell: Transforming Commerce as we Know It , 1999 .

[12]  Oren Etzioni,et al.  Moving Up the Information Food Chain: Deploying Softbots on the World Wide Web , 1996, AI Mag..

[13]  Udo W. Pooch,et al.  A Methodology for Using Intelligent Agents to provide Automated Intrusion Response , 2000 .

[14]  Robert E. Filman,et al.  Communicating security agents , 1996, Proceedings of WET ICE '96. IEEE 5th Workshop on Enabling Technologies; Infrastucture for Collaborative Enterprises.

[15]  Richard Mesic,et al.  Securing the U.S. Defense Information Infrastructure: A Proposed Approach , 1999 .

[16]  Jeffrey O. Kephart,et al.  A biologically inspired immune system for computers , 1994 .