skip to main content
10.1145/3264437.3264487acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems

Authors Info & Claims
Published:10 September 2018Publication History

ABSTRACT

The paper offers an approach for implementation of intelligent agents intended for network traffic and security risk analysis in cyber-physical systems. The agents are based on the algorithm of pseudo-gradient adaptive anomaly detection and fuzzy logical inference. The suggested algorithm operates in real time. The fuzzy logical inference is used for regulation of algorithm parameters. The variants of the implementation are proposed. The experimental assessment of the approach confirms its high speed and adequate accuracy for network traffic analysis.

References

  1. ITU-T: General overview of the Global Information Infrastructure standards development. Recommendation Y.100, 1998.Google ScholarGoogle Scholar
  2. ITU-T: General overview of NGN. Recommendation Y.2001, 2004.Google ScholarGoogle Scholar
  3. ITU-T: General principles and general reference model for Next Generation Networks. Recommendation Y.2011, 2004.Google ScholarGoogle Scholar
  4. A. Kanáliková. 2005. Services In NGN -- Next Generation Networks. Journal of Information, Control and Management Systems, 3, 2 (2005), 97--102.Google ScholarGoogle Scholar
  5. N. Sefz. 2003. ITU-T QoS Standarts for IP -- Based Networks. IEEE Communication Magazine (June 2003), 82--89. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Wooldridge, N. R. Jennings. 1995. Intelligent Agents: Theory and Practice. The Knowledge Engineering Review, 10, 2 (1995), 115--152.Google ScholarGoogle Scholar
  7. M. Wooldridge, N. R. Jennings. 1995. Agent theories, architectures, and languages: a survey. In Proceedings of the workshop on agent theories, architectures, and languages on Intelligent agents (ECAI-94). SpringerVerlag New York, 1--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Y. Shoham and K. Leyton-Brown. 2008. Multiagent systems: algorithmic, game-theoretic, and logical foundations. Cambridge University Press, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris, and G. Tsudik. 2000. Itinerant Agents for Mobile Computing. Commun. Surveys Tuts. 3, 3 (July 2000), 34--49. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. M. Jonker and J. Treur. 1997. Compositional Verification of Multi-Agent Systems: A Formal Analysis of Pro-activeness and Reactiveness. In Revised Lectures from the International Symposium on Compositionality: The Significant Difference (COMPOS'97). UK, 350--380. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Oppliger. 2015. Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale. IEEE Security and Privacy 13, 6 (November 2015), 18--21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. R. Peltier. 2010. Information Security Risk Analysis (3rd ed.). Auerbach Publications, Boston, MA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. V. Gorodetski, I. Kotenko, and O. Karsaev. 2003. Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning. International Journal of Computer Systems Science & Engineering, 4 (2003), 191--200.Google ScholarGoogle Scholar
  14. V. Gorodetski, O. Karsayev, I. Kotenko, and A. Khabalov. 2002. Software Development Kit for Multi-agent Systems Design and Implementation. Lecture Notes in Artificial Intelligence, 2296 (2002), 121--130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. I. Kotenko, A. Ulanov. 2006. Simulation of internet DDoS attacks and defense. Lecture Notes in Computer Science. 4176 (2006), 327--342. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. I. Kotenko, A. Ulanov. 2007. Multi-agent framework for simulation of adaptive cooperative defense against internet attacks. Lecture Notes in Artificial Intelligence, 4476 (2007), 212--228. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. I. Kotenko, A. Konovalov, A. Shorov. 2012. Agent-based Simulation of Cooperative Defence against Botnets. Concurrency Computation Practice and Experience, Vol.24 (2012), No.6, 573--588. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. I. Saenko, S. Ageev, and I. Kotenko. 2015. Countermeasure Security Risks Management in the Internet of Things based on Fuzzy Logic Inference. In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2015), The 13th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2015, 655--659. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. I. Kotenko, I. Saenko, S. Ageev, and Y. Kopchak. 2015. Abnormal Traffic Detection in networks of the Internet of things based on fuzzy logical inference. In Proceedings of the XVIII Int. Conf. on Soft Computing and Measurements (SCM'2015), IEEE Xplore, 5--8.Google ScholarGoogle Scholar
  20. I. Saenko, S. Ageev, and I. Kotenko. 2016. Detection of traffic anomalies in multi-service networks based on a fuzzy logical inference. In Intelligent Distributed Computing X. Studies in Computational Intelligence, vol. 678. Proceedings of 10th International Symposium on Intelligent Distributed Computing (IDC'2016), 2016, Springer International Publishing, 79--88.Google ScholarGoogle Scholar
  21. C. M. Macal and M. J. North. 2009. Agent-based modeling and simulation. In Winter Simulation Conference (WSC '09). 86--98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. V. Paxson. 1998. A System for Detecting Network Intruders in Real-Time. In Proceedings of the 7th USENIX Security Symposium, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R. R. Yager and D. P. Filev. 1994. Essentials of Fuzzy Modeling and Control. Wiley-Interscience, New York, NY, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Y.-C. Hsu, G. Chen, S. Tong, and H.-X. Li. 2003. Integrated fuzzy modeling and adaptive control for nonlinear systems. Inf. Sci. 153, 1 (2003), 217--236. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. E. H. Mamdani. 1977. Application of Fuzzy Logic to Approximate Reasoning Using Linguistic Synthesis. IEEE Trans. Comput. 26, 12 (December 1977), 1182--1191. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. K. Goztepe. 2012. Designing fuzzy rule based expert system for cyber security. International Journal of Information Security Science, Vol.1, No.1.Google ScholarGoogle Scholar
  27. H. Mouratidis, M. Weiss, P. Giorgini. 2006. Modeling secure systems using an agent-oriented approach and security patterns. International Journal of Software Engineering and Knowledge Engineering, Vol.16, Issue 03.Google ScholarGoogle ScholarCross RefCross Ref
  28. V. Loia, A. Vaccaro, K. Vaisakh. 2013. A self-organizing architecture based on cooperative fuzzy agents for smart grid voltage control. IEEE Transactions on Industrial Informatics, Vol.9, Issue 3, 1415--1422.Google ScholarGoogle ScholarCross RefCross Ref
  29. S. Bijani, D. Robertson. 2014. A review of attacks and security approaches in open multi-agent systems. Artificial Intelligence Review, Vol.42, Issue 4, 607--636. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        SIN '18: Proceedings of the 11th International Conference on Security of Information and Networks
        September 2018
        148 pages
        ISBN:9781450366083
        DOI:10.1145/3264437

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 10 September 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper
        • Research
        • Refereed limited

        Acceptance Rates

        SIN '18 Paper Acceptance Rate24of42submissions,57%Overall Acceptance Rate102of289submissions,35%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader