期刊文献+
共找到39篇文章
< 1 2 >
每页显示 20 50 100
A Multi-Agent Immunology Model for Security Computer 被引量:5
1
作者 Liang Yi wen, Li Huan, Kang Li shan, Dong Hong bin College of Computer Science, Wuhan University, Wuhan 430072, China 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期486-490,共5页
This paper presents a computer immunology model for computer security, whose main components are defined as idea of Multi Agent. It introduces the natural immune system on the principle, discusses the idea and chara... This paper presents a computer immunology model for computer security, whose main components are defined as idea of Multi Agent. It introduces the natural immune system on the principle, discusses the idea and characteristics of Multi Agent. It gives a system model, and describes the structure and function of each agent. Also, the communication method between agents is described. 展开更多
关键词 computer immunology multi agent computer security
下载PDF
Secure Consensus Control for Multi-Agent Systems With Attacks and Communication Delays 被引量:14
2
作者 Yiming Wu Xiongxiong He 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2017年第1期136-142,共7页
This paper addresses the consensus problem for nonlinear multi-agent systems suffering from attacks and communication delays. The network studied in this paper consists of two types of agents, namely, loyal agents and... This paper addresses the consensus problem for nonlinear multi-agent systems suffering from attacks and communication delays. The network studied in this paper consists of two types of agents, namely, loyal agents and attack agents.The loyal agents update their states based on delayed state information exchanged with their neighbors. Meanwhile, the attack agents can strategically send messages with wrong values,or collude with other attack agents to disrupt the correct operation of the system. We design a novel delay robust secure consensus(DRSC) algorithm according to the neighboring nodes’ delayed information. Convergence analysis of the system under the protocol designed is provided by using Lyapunov-Krasovskii stability theory and Barbalat-like argument approach. Finally,an example and simulation results are presented to demonstrate the effectiveness of the algorithm. 展开更多
关键词 CONSENSUS delay systems multi-agent systems security
下载PDF
Consensus of networked control multi-agent systems using a double-layer encryption scheme
3
作者 Yamin Yan Zhiyong Chen Vijay Varadharajan 《Journal of Automation and Intelligence》 2023年第4期218-226,共9页
This paper addresses the decentralized consensus problem for a system of multiple dynamic agents with remote controllers via networking,known as a networked control multi-agent system(NCMAS).It presents a challenging ... This paper addresses the decentralized consensus problem for a system of multiple dynamic agents with remote controllers via networking,known as a networked control multi-agent system(NCMAS).It presents a challenging scenario where partial dynamic entities or remote control units are vulnerable to disclosure attacks,making them potentially malicious.To tackle this issue,we propose a secure decentralized control design approach employing a double-layer cryptographic strategy.This approach not only ensures that the input and output information of the benign entities remains protected from the malicious entities but also practically achieves consensus performance.The paper provides an explicit design,supported by theoretical proof and numerical verification,covering stability,steady-state error,and the prevention of computation overflow or underflow. 展开更多
关键词 multi-agent systems Networked control Cyberphysical security ENCRYPTION CONSENSUS
下载PDF
Multi-Agent Network Intrusion Active Defense Model Based on Immune Theory 被引量:2
4
作者 LIU Sunjun LI Tao WANG Diangang HU Xiaoqing XU Chun 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期167-171,共5页
Inspired by the immune theory and multi-agent systems, an immune multi-agent active defense model for network intrusion is established. The concept of immune agent is introduced, and its running mechanism is establish... Inspired by the immune theory and multi-agent systems, an immune multi-agent active defense model for network intrusion is established. The concept of immune agent is introduced, and its running mechanism is established. The method, which uses antibody concentration to quantitatively describe the degree of intrusion danger, is presented. This model implements the multi-layer and distributed active defense mechanism for network intrusion. The experiment results show that this model is a good solution to the network security defense. 展开更多
关键词 artificial immune system intrusion detection system multi-agent system network security
下载PDF
Agricultural Supply Chain Traceability System Based on Multi-Agent System 被引量:2
5
作者 CHEN Hong-lin 《Asian Agricultural Research》 2011年第10期42-45,49,共5页
In order to overcome defects in existing ASCTS(Agricultural Supply Chain Traceability System,a new traceability system based on Multi-Agent System(MAS) is put forward.By qualitative method,I analyze problems of applic... In order to overcome defects in existing ASCTS(Agricultural Supply Chain Traceability System,a new traceability system based on Multi-Agent System(MAS) is put forward.By qualitative method,I analyze problems of application of Agent technology in tracing quality of agricultural products.Physical model is built for this system and structure of traceability system is determined.Finally,algorithm is presented for major entities.From analysis of algorithm,it is proved that this system has some reference value in improving breadth and depth of product traceability. 展开更多
关键词 multi-agent System Agricultural product supply chain ASCTS Agricultural product security China
下载PDF
Performance Study of Distributed Multi-Agent Intrusion Detection System
6
作者 YIN Yong ZHOU Zu-de LIU Quan LI Fang-min LI Zhong-nan 《Computer Aided Drafting,Design and Manufacturing》 2005年第2期38-43,共6页
Traditional Intrusion Detection System (IDS) based on hosts or networks no longer meets the security requirements in today's network environment due to the increasing complexity and distributivity. A multi-agent di... Traditional Intrusion Detection System (IDS) based on hosts or networks no longer meets the security requirements in today's network environment due to the increasing complexity and distributivity. A multi-agent distributed IDS model, enhanced with a method of computing its statistical values of performance is presented. This model can accomplish not only distributed information collection, but also distributed intrusion detection and real-time reaction. Owing to prompt reaction and openness, it can detect intrusion behavior of both known and unknown sources. According to preliminary tests, the accuracy ratio of intrusion detection is higher than 92% on the average. 展开更多
关键词 distributed intrusion detection system multi-agent intrusion detectionmethod information security
下载PDF
Centralized multi-agent implementation for securing critical loads in PV based microgrid 被引量:10
7
作者 A.SUJIL Saurabh Kumar AGARWAL Rajesh KUMAR 《Journal of Modern Power Systems and Clean Energy》 SCIE EI 2014年第1期77-86,共10页
The promotion of recent critical load securing of power system research has been directed towards centralized commands and control functions.This paper presents a multi-agent based critical load securing in a PV based... The promotion of recent critical load securing of power system research has been directed towards centralized commands and control functions.This paper presents a multi-agent based critical load securing in a PV based microgrid.For the trustworthy operation of critical buildings,the reliability,efficiency and security of the power system should be guaranteed.At present,to increase the security and reliability of electricity supply there is a need to design a distributed and autonomous subset of a larger grid or a microgrid.This work also clearly discusses the modelling and simulation of specialized microgrid called an Intelligent Distributed Autonomous Power Systems(IDAPS).The IDAPS microgrid plays a crucial role in constructing power grid that facilitate use of renewable energy technologies.IDAPS microgrid comprising of solar photovoltaic as distributed energy resources,different loads and their control algorithms,has been developed.Several case studies have been simulated to evaluate the operation of the IDAPS microgrid during parallel,islanded mode operation and securing critical loads during emergency. 展开更多
关键词 MICROGRID multi-agent system(MAS) Critical load securing Distributed energy resources
原文传递
一个基于Multi-Agent的计算机安全免疫系统模型 被引量:3
8
作者 李欢 梁意文 +1 位作者 曹霞 汤远闲 《计算机科学》 CSCD 北大核心 2001年第8期53-55,共3页
This paper presents a computer immunology system model,whose main components are defined according to the idea of Multi-Agent. Then the paper describes the structure and function of each agent. Also,the communication ... This paper presents a computer immunology system model,whose main components are defined according to the idea of Multi-Agent. Then the paper describes the structure and function of each agent. Also,the communication method between agents is described. 展开更多
关键词 multi-agent 计算机安全免疫系统 消息处理器 信息安全
下载PDF
A Game Theoretic Approach for a Minimal Secure Dominating Set
9
作者 Xiuyang Chen Changbing Tang Zhao Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第12期2258-2268,共11页
The secure dominating set(SDS),a variant of the dominating set,is an important combinatorial structure used in wireless networks.In this paper,we apply algorithmic game theory to study the minimum secure dominating se... The secure dominating set(SDS),a variant of the dominating set,is an important combinatorial structure used in wireless networks.In this paper,we apply algorithmic game theory to study the minimum secure dominating set(Min SDS) problem in a multi-agent system.We design a game framework for SDS and show that every Nash equilibrium(NE) is a minimal SDS,which is also a Pareto-optimal solution.We prove that the proposed game is an exact potential game,and thus NE exists,and design a polynomial-time distributed local algorithm which converges to an NE in O(n) rounds of interactions.Extensive experiments are done to test the performance of our algorithm,and some interesting phenomena are witnessed. 展开更多
关键词 Algorithmic game theory multi-agent systems po-tential game secure dominating set
下载PDF
Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture 被引量:3
10
作者 Amir Mohamed Talib Rodziah Atan +1 位作者 Rusli Abdullah Masrah Azrifah Azmi Murad 《Journal of Information Security》 2012年第4期295-306,共12页
The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many d... The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. It is immature, it is fragmented and it lacks standardization. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper a comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facilitate confidentiality, correctness assurance, availability and integrity of users' data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS architecture includes main five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to verify our proposed security framework based on MAS architecture, pilot study is conducted using a questionnaire survey. Rasch Methodology is used to analyze the pilot data. Item reliability is found to be poor and a few respondents and items are identified as misfits with distorted measurements. As a result, some problematic questions are revised and some predictably easy questions are excluded from the questionnaire. A prototype of the system is implemented using Java. To simulate the agents, oracle database packages and triggers are used to implement agent functions and oracle jobs are utilized to create agents. 展开更多
关键词 CLOUD COMPUTING multi-agent System CLOUD Data STORAGE security Framework CLOUD Service PROVIDER
下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
11
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 CLOUD Computing CLOUD DATA STORAGE CLOUD Service PROVIDER Formula-Based CLOUD DATA Access Control multi-agent System and secure Java Agent Development Framework
下载PDF
基于分布式协同免疫的电力负荷管理终端安全防护策略
12
作者 刘博涵 陆俊 +3 位作者 丁慧霞 龚钢军 高凯强 汪莞乔 《电力信息与通信技术》 2024年第5期31-35,共5页
电力负荷管理终端点多面广,应用场景复杂,控制策略迥异,不同信息安全分区防护边界模糊。现有新型电力负荷管理终端通信面临交互协议陈旧、通信带宽受限、组网可靠性不足等问题,采用4G/5G公网、无线自组网等开放网络通信将导致其面临更... 电力负荷管理终端点多面广,应用场景复杂,控制策略迥异,不同信息安全分区防护边界模糊。现有新型电力负荷管理终端通信面临交互协议陈旧、通信带宽受限、组网可靠性不足等问题,采用4G/5G公网、无线自组网等开放网络通信将导致其面临更高的安全风险。为解决上述问题,文章首先分析免疫学理论与电力负荷管理终端安全防护需求的适配度;其次,提出基于分布式协同免疫的电力负荷管理终端安全防护策略;最后,通过算例验证了所提策略的有效性。 展开更多
关键词 免疫学理论 新型电力系统 负荷管理终端 网络安全 入侵检测
下载PDF
基于免疫学的入侵检测系统模型 被引量:11
13
作者 张琨 徐永红 +1 位作者 王珩 刘凤玉 《南京理工大学学报》 EI CAS CSCD 北大核心 2002年第4期337-340,共4页
随着网络安全问题日益突出 ,入侵检测越来越受到关注 ,针对目前各种类型的防火墙和防病毒软件都存在一定的缺陷 ,该文基于仿生学的免疫原理 ,将肽链定义为在网络操作系统中由授权程序执行的系统调用短序列 ,提出了一种新型的入侵检测系... 随着网络安全问题日益突出 ,入侵检测越来越受到关注 ,针对目前各种类型的防火墙和防病毒软件都存在一定的缺陷 ,该文基于仿生学的免疫原理 ,将肽链定义为在网络操作系统中由授权程序执行的系统调用短序列 ,提出了一种新型的入侵检测系统———基于免疫学的入侵检测系统 ,并对其主要功能模块 :免疫计算机和监控器进行了分析。 展开更多
关键词 模型 免疫学 入侵检测 系统调用 网络安全 免疫计算机 监控器
下载PDF
一个基于免疫的网络入侵检测模型 被引量:7
14
作者 张慧敏 何军 黄厚宽 《计算机工程与应用》 CSCD 北大核心 2002年第6期159-160,230,共3页
文章通过研究现有的入侵检测系统和学习计算免疫系统,提出了一种基于免疫的入侵检测模型。它运用免疫系统的多层性、分布性、自组织性等特性,通过具有免疫特性的多Agent实时检测网络,提高网络系统的安全性,具有分布性、适应性等特点。
关键词 计算免疫系统 入侵检测系统 网络安全 防火墙 计算机网络
下载PDF
基于免疫的自适应性网络入侵检测模型设计 被引量:5
15
作者 鱼静 戴宗友 王峰 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2005年第11期1372-1376,共5页
自然免疫系统与计算机安全问题有很多相似性,两者主要工作都是如何区分“自我”与“非我”。文章根据人工免疫的原理、体系结构,建立了一种基于免疫原理的自适应性网络入侵检测系统模型,以改进现有网络入侵检测系统的性能;详细给出了该... 自然免疫系统与计算机安全问题有很多相似性,两者主要工作都是如何区分“自我”与“非我”。文章根据人工免疫的原理、体系结构,建立了一种基于免疫原理的自适应性网络入侵检测系统模型,以改进现有网络入侵检测系统的性能;详细给出了该模型在计算机中的数学描述、系统结构及具体实现;并在网络环境下完成了模拟攻击实验。 展开更多
关键词 网络安全 免疫 入侵检测 自适应性
下载PDF
免疫识别器构造的多级演化 被引量:11
16
作者 梁意文 潘海军 康立山 《小型微型计算机系统》 CSCD 北大核心 2002年第4期441-443,共3页
本文提出了基于多种群演化的遗传算法程序设计 ,通过对识别器的“自我”训练和“非我”测试来构造计算机网络安全免疫系统中至关重要的识别器 。
关键词 计算机免疫 网络安全 遗传算法 免疫识别器 多级演化 计算机网络
下载PDF
基于免疫Agent的网络安全模型 被引量:6
17
作者 苏成 殷兆麟 《计算机工程与设计》 CSCD 2003年第2期30-32,共3页
借鉴现代免疫学理论,是解决网络安全问题的新的有效途径。分析了生物的免疫应答机理,利用B细胞网络模型与Agent技术,设计了一个基于免疫Agent的网络安全模型。该模型由产生多样性抗体、识别自我和识别非我等过程实现,并且具有分布性、... 借鉴现代免疫学理论,是解决网络安全问题的新的有效途径。分析了生物的免疫应答机理,利用B细胞网络模型与Agent技术,设计了一个基于免疫Agent的网络安全模型。该模型由产生多样性抗体、识别自我和识别非我等过程实现,并且具有分布性、健壮性和自适应性等特点。 展开更多
关键词 网络安全模型 免疫学理论 AGENT 人工智能 人工免疫系统 计算机网络
下载PDF
基于生物免疫学的分布式入侵检测系统模型 被引量:7
18
作者 戚湧 张琨 +1 位作者 刘凤玉 衷宜 《计算机工程与设计》 CSCD 2004年第4期481-483,563,共4页
基于仿生学的免疫原理,将肽链定义为在操作系统中由特权进程执行的系统调用及参数短序列,提出了一个基于生物免疫学的分布式入侵检测系统模型。该模型模拟生物免疫系统中的多样性、分布性、初次应答和再次应答等基本工作原理,通过免疫... 基于仿生学的免疫原理,将肽链定义为在操作系统中由特权进程执行的系统调用及参数短序列,提出了一个基于生物免疫学的分布式入侵检测系统模型。该模型模拟生物免疫系统中的多样性、分布性、初次应答和再次应答等基本工作原理,通过免疫计算机和控制台之间的信息共享、相互协作实现实时入侵检测。对系统的体系结构进行了阐述,对系统的关键组件及其功能做了详细的描述。 展开更多
关键词 免疫计算机 入侵检测 肽链 系统调用 网络安全 免疫学
下载PDF
基于免疫的入侵检测系统中检测子集分布策略 被引量:3
19
作者 鱼静 戴宗友 王峰 《计算机工程与设计》 CSCD 北大核心 2010年第11期2435-2438,共4页
为了提高现有的入侵检测系统的鲁棒性及对未知入侵的检测能力,根据免疫的原理、体系结构,建立了一种新的基于免疫原理的分布式入侵检测系统模型。在该模型中,检测子集如何在各个分布式节点上合理的分配将在很大程度上影响系统的性能。... 为了提高现有的入侵检测系统的鲁棒性及对未知入侵的检测能力,根据免疫的原理、体系结构,建立了一种新的基于免疫原理的分布式入侵检测系统模型。在该模型中,检测子集如何在各个分布式节点上合理的分配将在很大程度上影响系统的性能。在分析了影响检测子集分布空间因素的基础上,从理论上研究了分布策略的优劣,给出了一种可行的将具有部分重复检测空间的检测子尽量分配到不同检测节点的方法。实验结果表明,与单纯的顺序分配相比该策略能在部分检测节点失效时系统依然维持较高的检测率。 展开更多
关键词 人工免疫 入侵检测 网络安全 分布式 检测子 鲁棒性
下载PDF
基于免疫的入侵检测模型中空洞的分析及对策 被引量:5
20
作者 鱼静 王峰 《计算机应用》 CSCD 北大核心 2008年第6期1407-1410,共4页
根据人工免疫的原理、体系结构,建立了一种新的基于免疫原理的分布式网络入侵检测系统模型。该模型中存在着检测子集合无法检测到的非我——"空洞"。"空洞"会导致模型性能的下降,漏报率的增高。在详细分析了"... 根据人工免疫的原理、体系结构,建立了一种新的基于免疫原理的分布式网络入侵检测系统模型。该模型中存在着检测子集合无法检测到的非我——"空洞"。"空洞"会导致模型性能的下降,漏报率的增高。在详细分析了"空洞"产生的原因以及"空洞"的相关特性后,给出了减少"空洞"的对策,并用模拟试验的方式验证了不同形状的检测子可以有效弥补"空洞",从而使系统的漏报率下降。 展开更多
关键词 人工免疫 入侵检测 网络安全 检测子 空洞
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部