1 / 11

Dealing with trust issues in a multi-agent Intrusion prevention system

RB Whitaker CS 6100 10 December 2008. Dealing with trust issues in a multi-agent Intrusion prevention system. IPS and MAS Comparisons. IPS Features Run without human supervision Recover from failures Monitors itself Minimal overhead while running Match different security policies

nika
Download Presentation

Dealing with trust issues in a multi-agent Intrusion prevention system

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. RB WhitakerCS 6100 10 December 2008 Dealing with trust issues in a multi-agent Intrusion prevention system

  2. IPS and MAS Comparisons IPS Features Run without human supervision Recover from failures Monitors itself Minimal overhead while running Match different security policies Adapt to changes in the system Scalable to multiple hosts Degradation of service Dynamically configurable Determine course of action for response Determine course of action for future prevention Capable of performing a determined course of action MAS Features Autonomy Proactivity Reactivity Social Ability

  3. The Basic System • Agents are responsible for specific components • Agents make judgements about the safety of the current situation • Agents work with other agents • Request for information about a state • Assemble collected information • Factor in what agent currently knows • Handle other agents’ state requests

  4. The Trust Problem • How has trust been dealt with in the past? • What happens when an agent becomes compromised?

  5. The Solution • You can trust yourself • You can’t trust anyone • You cantrust everyone • Develop a set or correspondence agents

  6. Experiments • Optimal configuration of correspondence set size • Comparison to other trust models • Comparison to existing Intrusion Detection Systems

  7. Determining an Optimal Configuration

  8. Comparison to Other Trust Models

  9. Comparison to other IDS’s

  10. Conclusions & Future Work • Group-based trust is a more effective approach in an IPS setting • Competitive with existing IDS systems • Can be applied to other areas of MAS

  11. References • Barber, K. Suzanne, Karen Fullam, and Joonoo Kim. "Challenges for Trust, Fraud and Deception Research in Multi-Agent Systems." Volume 2631 of LNCS. Springer, 2003. 8-14. • Huynh, Dong, Nicholas R. Jennings, and Nigel R. Shadbolt. "Developing an Integrated Trust and Reputation Model for Open Multi-Agent Systems." Proceedings of the 7th International Workshop on Trust in Agent Societies. 2004. 62-77. • Josang, Audun, Roslan Ismail, and Colin Boyd. "A Survey of Trust and Reputation Systems for Online Service Provision." Decision Support Systems, 2007: 618-644. • Kagal, Lalana, Tim Finin, and Anupam Joshi. "Developing Secure Agent Systems Using Delegation Based Trust Management." Proceedings of Security Mobile Multi-Agent Systems Workshop (AAMAS 2002). 2002. • Ramchurn, Sarvapali D., Dong Huynh, and Nicholas R. Jennings. "Trust in Multi-Agent Systems." The Knowledge Engineering Review, 2004: 1-25. • Stallings, William, and Lawrie Brown. Computer Security: Principles and Practice. Upper Saddle River, NJ: Pearson Education, Inc., 2008. • Wooldridge, Michael. An Introduction to MultiAgent Systems. West Sussex, England: John Wiley & Sons Ltd., 2002.

More Related