Abstract
An approach to investigation of mechanisms of protection of information resources on the Internet based on multiagent simulation is proposed. According to this approach, protection systems are considered as interacting teams of intellectual agents. The architecture and program implementation of the simulation environment providing a possibility of integration of simulation on the basis of discrete events, multiagent approach, and simulation of network packet exchange using different Internet protocols are presented. The developed environment provides a possibility of analysis of complex attack scenarios and defense mechanisms. Experimental results on investigation of cooperative mechanisms of defense from “Distributed Denial of Service” attacks are presented. The promising character of realization of these mechanisms for defense from distributed attacks on the Internet is demonstrated.
Similar content being viewed by others
References
A. H. Bond, L. Gasser, Readings in Distributed Artificial Intelligence (London: Morgan Kaufmann, 1988).
C. M. Macal and M. J. North, “Tutorial on Agent-Based Modeling and Simulation,” in Proceedings of 2005 Winter Simulation Conference, New Jersey, USA, 2005, 231–250 (2005).
V. B. Tarasov, From Multiagent Systems to Intellectual Organizations: Philosophy, Psychology, Informatics (Moscow: URSS, 2002) [in Russian].
V. I. Gorodetskii and I. V. Kotenko, “Conceptual Basics of Stochastic Simulation on the Internet”, in Transactions Institute System Analysis RAS, 9, 20–25 (Moscow: URSS, 2005).
M. V. Alstyne, E. Brynholfsson, Electronic Communities: Global Village or Cyberbalkanization. MIT Sloan School of Management Working Paper, ebusiness.mit.edu/erik (1996).
J. Mirkovie, S. Dietrich, D. Dittrich, et al., Internet Denial of Service: Attack and Defense Mechanisms (New York: Prentice-Hall, 2004).
I. V. Kotenko, A. V. Ulanov, “Agent-Based Simulation of DDoS Attacks and Defense Mechanisms”, J. Computing, 4(2), 16–37 (2005).
M. Tambe, “Towards Flexible Teamwork”, J. AI Research, 7, 50–75 (1997).
X. Fan, J. Yen, “Modeling and Simulating Human Teamwork Behaviors Using Intelligent Agents”, J. Phys. Life Reviews, 1(3), 33–51 (2004).
P. Paruchuri, E. Bowring, R. Nair, et al., “Multiagent Teamwork: Hybrid Approaches”, Comp. Soc. of India Communications, 3, 55–69 (2006).
J. Ioannidis, S. M. Bellovin, “Implementing Pushback: Router Defense against DDoS Attacks”, in Proceedings of Network and Distributed Systems Securing Symposium, San Diego, USA, 2002), pp. 78–93.
Y. Xiang, W. Zhou, M. Chowdhury, “A Survey of Active and Passive Defense Mechanisms against DDoS Attacks”, Technical Report, TR C04/02, School of Information Technology, Deakin University (2004).
J. Yuan, K. Mills, “Monitoring the Macroscopic Effect of DDoS Flooding Attacks”, IEEE Trans. Dependable and Secure Computing, 2(4), 210–232 (2005).
M. Marietto, N. David, J. S. Sichman, et al., “Requirements Analysis of Agent-Based Simulation Platforms: State of the Art and New Prospects”, in Proceedings of 3rd International Workshop, MABS 2002, Bologna, Italy, 2002, pp. 2132–2141.
FIPA, http.//www.fipa.org.
OMNet++ homepage, http://www.omnetpp.org.
P. Mahadevan, D. Krioukov, M. Fomenkov, et al., “Lessons from Three Views of the Internet Topology, http://www.caida.org.
CAIDA, http://www.caida.org/tools.
Route-Views Bibliography, http.//www.routeviews.org/papers.
S. N. Dorogovtsev and J. F. F. Mendes, “The Shortest Path to Complex Networks”, http://arxiv.org/abs/condmat/0404593.
M. Catanzaro, M. Bogu@na, and R. Pastor-Satorras, “Generation of Uncorrelated Random Scale-Free Networks”, Phys. Rev. E. 71(027103), 12–15 (2005).
C. Jin, H. Wang, and K. G. Shin, “Hop-Count Filtering: An Effective Defense against Spoofed DDoS Traffic”, in Proceedings 10th ACM Conf. on Computer and Communication Seciruty, 76–89 (Washington DC, 2003).
T. Peng, L. Christopher, and R. Kotagiri, “Protection from Distributed Denial of Service Attach Using History-Based IP Filtering”, in Proceedings of IEEE International Conference on Communications, Anchorage, USA, 2003, pp. 103–112.
Author information
Authors and Affiliations
Additional information
Original Russian Text © I.V. Kotenko, A.V. Ulanov, 2007, published in Izvestiya Akademii Nauk. Teoriya i Sistemy Upravleniya, 2007, No. 5, pp. 74–88.
Rights and permissions
About this article
Cite this article
Kotenko, I.V., Ulanov, A.V. Multiagent simulation of protection of information resources in internet. J. Comput. Syst. Sci. Int. 46, 741–755 (2007). https://doi.org/10.1134/S1064230707050073
Received:
Issue Date:
DOI: https://doi.org/10.1134/S1064230707050073