Coalitions among computationally bounded agents
Artificial Intelligence - Special issue on economic principles of multi-agent systems
Distributed rational decision making
Multiagent systems
REGRET: reputation in gregarious societies
Proceedings of the fifth international conference on Autonomous agents
ACM Transactions on Information and System Security (TISSEC)
Internet intrusions: global characteristics and prevalence
SIGMETRICS '03 Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Enforcement of Communications Policies in Software Agent Systems through Mobile Code
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
A Market Protocol for Decentralized Task Allocation
ICMAS '98 Proceedings of the 3rd International Conference on Multi Agent Systems
Detecting deception in reputation management
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
Indra: A peer-to-peer approach to network intrusion detection and prevention
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
IEEE Security and Privacy
Agent-Based Global Transportation Scheduling in Military Logistics
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 3
A holistic approach to service survivability
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Review on Computational Trust and Reputation Models
Artificial Intelligence Review
The Knowledge Engineering Review
Trust Model for Open Ubiquitous Agent Systems
IAT '05 Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology
Countering Network Worms Through Automatic Patch Generation
IEEE Security and Privacy
Distributed Planning Algorithm for Coalition Logistics in Semi-trusted Environment
DIS '06 Proceedings of the IEEE Workshop on Distributed Intelligent Systems: Collective Intelligence and Its Applications
Reflective-Cognitive Architecture: From Abstract Concept to Self-Adapting Agent
DIS '06 Proceedings of the IEEE Workshop on Distributed Intelligent Systems: Collective Intelligence and Its Applications
An integrated trust and reputation model for open multi-agent systems
Autonomous Agents and Multi-Agent Systems
Representing Context for Multiagent Trust Modeling
IAT '06 Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
The Zombie roundup: understanding, detecting, and disrupting botnets
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
The Contract Net Protocol: High-Level Communication and Control in a Distributed Problem Solver
IEEE Transactions on Computers
Integrating trustfulness and decision using fuzzy cognitive maps
iTrust'03 Proceedings of the 1st international conference on Trust management
Hi-index | 0.00 |
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconnected from the recent advances in the multi-agent research, most notably the field of trust modeling. Our contribution reviews recent implementations of IDS systems and presents them from an agent research perspective. We also identify the opportunities where the agent approaches can be successfully used. Agent techniques can make the IDS more adaptive, scalable and reliable while increasing their autonomy and reducing the maintenance requirements. Besides trust modeling, we propose that the distributed decision-making and planning techniques can be used to shorten the detection-response loop, making the system more robust while facing worm attacks.