{"title":"多智能体自组织安全系统的群体感应模式","authors":"J. Hamar, R. Dove","doi":"10.1109/CCST.2012.6393579","DOIUrl":null,"url":null,"abstract":"Swarm concepts of various types borrowed from nature have been proposed for multi-agent security approaches. Distributed decision-making in multi-agent systems is of particular interest, and has good application in large networks with end-point agents looking for anomalies and potential threat indications, which in isolation may mean nothing. Quorum sensing (QS) in bacterial systems and Honeybee nest-site selection are two examples of distributed decision making in nature that show promise for reuse in reaching collective conclusions and triggering action in networked cyber systems. This paper examines these two cases of QS in nature and abstracts a generic pattern that qualifies for self-organizing security according to six SAREPH characteristics covered in prior work. The pattern form and qualifying characteristics from this prior work are briefly outlined, and QS in the two different natural systems is shown to reach a tipping point based on the density of independent agents with relevant similarities. The inter-agent signaling mechanisms are shown to be central to the process, and the abstracted core pattern is discussed with the conflicting forces that have to be resolved in any application of the pattern. Illustrative examples of both deployed and proposed security approaches are then shown employing this pattern, along with a pseudo-code model for an appropriate signaling mechanism inspired by a paper on social network quorum achievement.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"A quorum sensing pattern for multi-agent self-organizing security systems\",\"authors\":\"J. Hamar, R. Dove\",\"doi\":\"10.1109/CCST.2012.6393579\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Swarm concepts of various types borrowed from nature have been proposed for multi-agent security approaches. Distributed decision-making in multi-agent systems is of particular interest, and has good application in large networks with end-point agents looking for anomalies and potential threat indications, which in isolation may mean nothing. Quorum sensing (QS) in bacterial systems and Honeybee nest-site selection are two examples of distributed decision making in nature that show promise for reuse in reaching collective conclusions and triggering action in networked cyber systems. This paper examines these two cases of QS in nature and abstracts a generic pattern that qualifies for self-organizing security according to six SAREPH characteristics covered in prior work. The pattern form and qualifying characteristics from this prior work are briefly outlined, and QS in the two different natural systems is shown to reach a tipping point based on the density of independent agents with relevant similarities. The inter-agent signaling mechanisms are shown to be central to the process, and the abstracted core pattern is discussed with the conflicting forces that have to be resolved in any application of the pattern. Illustrative examples of both deployed and proposed security approaches are then shown employing this pattern, along with a pseudo-code model for an appropriate signaling mechanism inspired by a paper on social network quorum achievement.\",\"PeriodicalId\":405531,\"journal\":{\"name\":\"2012 IEEE International Carnahan Conference on Security Technology (ICCST)\",\"volume\":\"141 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE International Carnahan Conference on Security Technology (ICCST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2012.6393579\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2012.6393579","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A quorum sensing pattern for multi-agent self-organizing security systems
Swarm concepts of various types borrowed from nature have been proposed for multi-agent security approaches. Distributed decision-making in multi-agent systems is of particular interest, and has good application in large networks with end-point agents looking for anomalies and potential threat indications, which in isolation may mean nothing. Quorum sensing (QS) in bacterial systems and Honeybee nest-site selection are two examples of distributed decision making in nature that show promise for reuse in reaching collective conclusions and triggering action in networked cyber systems. This paper examines these two cases of QS in nature and abstracts a generic pattern that qualifies for self-organizing security according to six SAREPH characteristics covered in prior work. The pattern form and qualifying characteristics from this prior work are briefly outlined, and QS in the two different natural systems is shown to reach a tipping point based on the density of independent agents with relevant similarities. The inter-agent signaling mechanisms are shown to be central to the process, and the abstracted core pattern is discussed with the conflicting forces that have to be resolved in any application of the pattern. Illustrative examples of both deployed and proposed security approaches are then shown employing this pattern, along with a pseudo-code model for an appropriate signaling mechanism inspired by a paper on social network quorum achievement.