Controlling cooperative problem solving in industrial multi-agent systems using joint intentions
Artificial Intelligence
Collaborative plans for complex group action
Artificial Intelligence
The theory of parsing, translation, and compiling
The theory of parsing, translation, and compiling
Towards Heterogeneous Agent Teams
EASSS '01 Selected Tutorial Papers from the 9th ECCAI Advanced Course ACAI 2001 and Agent Link's 3rd European Agent Systems Summer School on Multi-Agent Systems and Applications
Software Development Kit for Multi-agent Systems Design and Implementation
CEEMAS '01 Revised Papers from the Second International Workshop of Central and Eastern Europe on Multi-Agent Systems: From Theory to Practice in Multi-Agent Systems
The Multi-Agent Systems for Computer Network Security Assurance: Frameworks and Case Studies
ICAIS '02 Proceedings of the 2002 IEEE International Conference on Artificial Intelligence Systems (ICAIS'02)
Journal of Artificial Intelligence Research
Attacks against computer network: formal grammar-based framework and simulation tool
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Hi-index | 0.00 |
The paper considers an approach to the agents' teamwork implementation. It is described on an example of simulation of the coordinated distributed attacks on computer networks fulfilled by a group of hackers-agents. The approach is based on main positions of the "joint intentions" theory and the "common plans" theory. The offered technology of creation of the agents' team includes the following stages: (1) formation of the subject domain ontology; (2) determination of the agents' team structure and mechanisms of their interaction and coordination; (3) specifications of the agents' actions plans as a hierarchy of attribute stochastic formal grammars; (4) assignment of roles and allocation of plans between the agents; (5) state-machine based interpretation of the teamwork. The stages of ontology creation, agents' plans specification and state-machine based interpretation of attack generation are considered. The Attack Simulator software prototype and its evaluation results are described.