Tytuł artykułu
Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
This article presents methods derived from ethically-social domain, which enables detection of intruders in a multi-agent system. Proposed mechanisms may enable to recognize and block actions of entities undesirable or harmful in the computer system on the basis of behavior observation (actions which they undertake). These mechanisms were applied to the network traffic control system and tested in simulations. The results of tests are presented and discussed.
Słowa kluczowe
Czasopismo
Rocznik
Tom
Strony
123--130
Opis fizyczny
Bibliogr. 6 poz., rys.
Twórcy
autor
- Department of Computer Network, Nowy Sącz School of Business – National – Louis University, ul. Zielona 27, 33-300 Nowy Sącz, Poland
Bibliografia
- 1. Gordon L.A., Loeb M.P., Lucyshyn W. , Richardson R.: 2005 CSI/FBI Computer Crime And Security Survey. http://www.gocsi.com.
- 2. Cetnarowicz K., Cięciwa R., Rojek G.: Algorithm of Behavior Evaluation in Multi-agent System. Lecture Notes in Computer Science, Vol. 3516, Springer-Verlag, p.711-718, 2005.
- 3. Cetnarowicz K., Cięciwa R., Nawarecki E., Rojek G.: Unvaforable Behavior Detection in Real World Systems Using the Multiagent System. Advances in Soft Computing, Intelligent Information Processing and Web Mining, Springer-Verlag, p. 416-420, 2005.
- 4. Cetnarowicz K.: M-agent architecture based method of development of multiagent systems. Proc. of the 8th EPS-APS International Confrrence on Physics Computing, ACC Cyfronet, Kraków, 1996.
- 5. Forrest S., Perelson A. S., Allen L., Cherukuru R.: A change-detection algorithm inspired by the immune system. Los Alamitos (Ed.) IEE Transactions on Software Engineering, IEEE Computer Society Press, 1995.
- 6. Wierzchoń S. T.: Sztuczne systemy immunologiczne: teoria i zastosowania. Akademicka Oficyna Wydawnicza Exit, Warszawa, 2001.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-2ee7266c-b4ac-484e-ae18-5cf99ada598d