Collaborative plans for complex group action
Artificial Intelligence
Throttling Viruses: Restricting propagation to defeat malicious mobile code
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
High-Fidelity Modeling of Computer Network Worms
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Conflicts in teamwork: hybrids to the rescue
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Tutorial on agent-based modeling and simulation
WSC '05 Proceedings of the 37th conference on Winter simulation
Agent Teams in Cyberspace: Security Guards in the Global Internet
CW '06 Proceedings of the 2006 International Conference on Cyberworlds
Tutorial on agent-based modeling and simulation part 2: how to model with agents
Proceedings of the 38th conference on Winter simulation
An algorithm for anomaly-based botnet detection
SRUTI'06 Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet - Volume 2
A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior
SAINT-W '07 Proceedings of the 2007 International Symposium on Applications and the Internet Workshops
Peer-to-peer botnets: overview and case study
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
Realistic simulation environments for IP-based networks
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
SS'08 Proceedings of the 17th conference on Security symposium
A Survey of Botnet Technology and Defenses
CATCH '09 Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security
Adaptive Multiagent System for Network Traffic Monitoring
IEEE Intelligent Systems
Botnet: classification, attacks, detection, tracing, and preventive measures
ICICIC '09 Proceedings of the 2009 Fourth International Conference on Innovative Computing, Information and Control
Requirements analysis of agent-based simulation platforms: state of the art and new prospects
MABS'02 Proceedings of the 3rd international conference on Multi-agent-based simulation II
Multi-agent framework for simulation of adaptive cooperative defense against internet attacks
AIS-ADM'07 Proceedings of the 2nd international conference on Autonomous intelligent systems: agents and data mining
Handbook of Information and Communication Security
Handbook of Information and Communication Security
Modeling and Tools for Network Simulation
Modeling and Tools for Network Simulation
Mobile agents for network intrusion resistance
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
APHIDS++: evolution of a programmable hybrid intrusion detection system
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Preface to the Special Issue on intelligent distributed computing
Concurrency and Computation: Practice & Experience
Hi-index | 0.00 |
The paper outlines a framework and software tool intended for simulation of cooperative defence mechanisms against botnets. These framework and software tool are based on agent-oriented approach and packet-level network simulation. They are intended to evaluate and compare different cooperative distributed attacks and defence mechanisms. Botnet and defence components are represented in the paper as a set of collaborating and counteracting agent teams. Agents are supposed to collect information from various network sources, operate different situational knowledge, and react to actions of other agents. The paper describes the results of experiments aimed to investigate botnets and distributed denial of service defence mechanisms. We explore various botnet attacks and counteraction against them on the example of defence against distributed denial of service attacks. Copyright © 2011 John Wiley & Sons, Ltd.