Jan Kantert, H. Scharf, Sarah Edenhofer, Sven Tomforde, J. Hähner, C. Müller-Schloer
{"title":"多智能体系统运行时攻击检测的图分析方法","authors":"Jan Kantert, H. Scharf, Sarah Edenhofer, Sven Tomforde, J. Hähner, C. Müller-Schloer","doi":"10.1109/SASO.2014.20","DOIUrl":null,"url":null,"abstract":"Fully self-organised and open systems consisting of a variety of heterogeneous and autonomous entities can suffer due to malicious elements or attacks. One approach to cope with this challenge is to introduce trust. Thereby, trust relationships are based on ratings among individual entities and represent system-wide information. A Trusted Desktop Computing Grid is one example, where such a trust mechanism has been applied successfully. In this paper, we investigate the possibility to add an system-level Observer to the self-organised system in order to guide the overall behaviour and to intervene in disturbed situations that are mostly a result of malicious behaviour. Therefore, we describe in detail how the observation part of this Observer can be realised and what kind of metrics can be applied to detect undesired system behaviour. Evaluations are done using the Trusted Desktop Grid and demonstrate the possibility to detect malicious behaviour quickly and reliably by considering clusters of trusted entities.","PeriodicalId":6458,"journal":{"name":"2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems Workshops","volume":"52 1","pages":"80-89"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"A Graph Analysis Approach to Detect Attacks in Multi-agent Systems at Runtime\",\"authors\":\"Jan Kantert, H. Scharf, Sarah Edenhofer, Sven Tomforde, J. Hähner, C. Müller-Schloer\",\"doi\":\"10.1109/SASO.2014.20\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Fully self-organised and open systems consisting of a variety of heterogeneous and autonomous entities can suffer due to malicious elements or attacks. One approach to cope with this challenge is to introduce trust. Thereby, trust relationships are based on ratings among individual entities and represent system-wide information. A Trusted Desktop Computing Grid is one example, where such a trust mechanism has been applied successfully. In this paper, we investigate the possibility to add an system-level Observer to the self-organised system in order to guide the overall behaviour and to intervene in disturbed situations that are mostly a result of malicious behaviour. Therefore, we describe in detail how the observation part of this Observer can be realised and what kind of metrics can be applied to detect undesired system behaviour. Evaluations are done using the Trusted Desktop Grid and demonstrate the possibility to detect malicious behaviour quickly and reliably by considering clusters of trusted entities.\",\"PeriodicalId\":6458,\"journal\":{\"name\":\"2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems Workshops\",\"volume\":\"52 1\",\"pages\":\"80-89\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-09-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SASO.2014.20\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SASO.2014.20","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Graph Analysis Approach to Detect Attacks in Multi-agent Systems at Runtime
Fully self-organised and open systems consisting of a variety of heterogeneous and autonomous entities can suffer due to malicious elements or attacks. One approach to cope with this challenge is to introduce trust. Thereby, trust relationships are based on ratings among individual entities and represent system-wide information. A Trusted Desktop Computing Grid is one example, where such a trust mechanism has been applied successfully. In this paper, we investigate the possibility to add an system-level Observer to the self-organised system in order to guide the overall behaviour and to intervene in disturbed situations that are mostly a result of malicious behaviour. Therefore, we describe in detail how the observation part of this Observer can be realised and what kind of metrics can be applied to detect undesired system behaviour. Evaluations are done using the Trusted Desktop Grid and demonstrate the possibility to detect malicious behaviour quickly and reliably by considering clusters of trusted entities.