A Bayesian model of plan recognition
Artificial Intelligence
Controlling cooperative problem solving in industrial multi-agent systems using joint intentions
Artificial Intelligence
Collaborative plans for complex group action
Artificial Intelligence
Hop-count filtering: an effective defense against spoofed DDoS traffic
Proceedings of the 10th ACM conference on Computer and communications security
Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Perimeter-Based Defense against High Bandwidth DDoS Attacks
IEEE Transactions on Parallel and Distributed Systems
MULTOPS: a data-structure for bandwidth attack detection
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Journal of Artificial Intelligence Research
Attacks against computer network: formal grammar-based framework and simulation tool
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
A new model of plan recognition
UAI'99 Proceedings of the Fifteenth conference on Uncertainty in artificial intelligence
Multi-agent framework for simulation of adaptive cooperative defense against internet attacks
AIS-ADM'07 Proceedings of the 2nd international conference on Autonomous intelligent systems: agents and data mining
Simulation-based study of botnets and defense mechanisms against them
Journal of Computer and Systems Sciences International
Hi-index | 0.00 |
The research devoted to design and implementation of new knowledge-based methods and tools for verification and validation of complex software systems is now an important direction of scientific investigations. The paper describes the approach and software environment developed for agent-based modeling and simulation of defense against coordinated distributed attacks in the Internet. According to this approach, the cybernetic opposition of malefactors and defense systems in the Internet is represented by competition of antagonistic softbots' teams. The possibility of the approach application is analyzed by testing the defense mechanisms against Distribute Denial of Service attacks.