Skip to main content
Log in

Multiagent simulation of protection of information resources in internet

  • Computer Methods
  • Published:
Journal of Computer and Systems Sciences International Aims and scope

Abstract

An approach to investigation of mechanisms of protection of information resources on the Internet based on multiagent simulation is proposed. According to this approach, protection systems are considered as interacting teams of intellectual agents. The architecture and program implementation of the simulation environment providing a possibility of integration of simulation on the basis of discrete events, multiagent approach, and simulation of network packet exchange using different Internet protocols are presented. The developed environment provides a possibility of analysis of complex attack scenarios and defense mechanisms. Experimental results on investigation of cooperative mechanisms of defense from “Distributed Denial of Service” attacks are presented. The promising character of realization of these mechanisms for defense from distributed attacks on the Internet is demonstrated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. A. H. Bond, L. Gasser, Readings in Distributed Artificial Intelligence (London: Morgan Kaufmann, 1988).

    Google Scholar 

  2. C. M. Macal and M. J. North, “Tutorial on Agent-Based Modeling and Simulation,” in Proceedings of 2005 Winter Simulation Conference, New Jersey, USA, 2005, 231–250 (2005).

  3. V. B. Tarasov, From Multiagent Systems to Intellectual Organizations: Philosophy, Psychology, Informatics (Moscow: URSS, 2002) [in Russian].

    Google Scholar 

  4. V. I. Gorodetskii and I. V. Kotenko, “Conceptual Basics of Stochastic Simulation on the Internet”, in Transactions Institute System Analysis RAS, 9, 20–25 (Moscow: URSS, 2005).

    Google Scholar 

  5. M. V. Alstyne, E. Brynholfsson, Electronic Communities: Global Village or Cyberbalkanization. MIT Sloan School of Management Working Paper, ebusiness.mit.edu/erik (1996).

  6. J. Mirkovie, S. Dietrich, D. Dittrich, et al., Internet Denial of Service: Attack and Defense Mechanisms (New York: Prentice-Hall, 2004).

    Google Scholar 

  7. I. V. Kotenko, A. V. Ulanov, “Agent-Based Simulation of DDoS Attacks and Defense Mechanisms”, J. Computing, 4(2), 16–37 (2005).

    Google Scholar 

  8. M. Tambe, “Towards Flexible Teamwork”, J. AI Research, 7, 50–75 (1997).

    Google Scholar 

  9. X. Fan, J. Yen, “Modeling and Simulating Human Teamwork Behaviors Using Intelligent Agents”, J. Phys. Life Reviews, 1(3), 33–51 (2004).

    Google Scholar 

  10. P. Paruchuri, E. Bowring, R. Nair, et al., “Multiagent Teamwork: Hybrid Approaches”, Comp. Soc. of India Communications, 3, 55–69 (2006).

    Google Scholar 

  11. J. Ioannidis, S. M. Bellovin, “Implementing Pushback: Router Defense against DDoS Attacks”, in Proceedings of Network and Distributed Systems Securing Symposium, San Diego, USA, 2002), pp. 78–93.

  12. Y. Xiang, W. Zhou, M. Chowdhury, “A Survey of Active and Passive Defense Mechanisms against DDoS Attacks”, Technical Report, TR C04/02, School of Information Technology, Deakin University (2004).

  13. J. Yuan, K. Mills, “Monitoring the Macroscopic Effect of DDoS Flooding Attacks”, IEEE Trans. Dependable and Secure Computing, 2(4), 210–232 (2005).

    Google Scholar 

  14. M. Marietto, N. David, J. S. Sichman, et al., “Requirements Analysis of Agent-Based Simulation Platforms: State of the Art and New Prospects”, in Proceedings of 3rd International Workshop, MABS 2002, Bologna, Italy, 2002, pp. 2132–2141.

  15. FIPA, http.//www.fipa.org.

  16. OMNet++ homepage, http://www.omnetpp.org.

  17. P. Mahadevan, D. Krioukov, M. Fomenkov, et al., “Lessons from Three Views of the Internet Topology, http://www.caida.org.

  18. CAIDA, http://www.caida.org/tools.

  19. Route-Views Bibliography, http.//www.routeviews.org/papers.

  20. S. N. Dorogovtsev and J. F. F. Mendes, “The Shortest Path to Complex Networks”, http://arxiv.org/abs/condmat/0404593.

  21. M. Catanzaro, M. Bogu@na, and R. Pastor-Satorras, “Generation of Uncorrelated Random Scale-Free Networks”, Phys. Rev. E. 71(027103), 12–15 (2005).

    Google Scholar 

  22. C. Jin, H. Wang, and K. G. Shin, “Hop-Count Filtering: An Effective Defense against Spoofed DDoS Traffic”, in Proceedings 10th ACM Conf. on Computer and Communication Seciruty, 76–89 (Washington DC, 2003).

  23. T. Peng, L. Christopher, and R. Kotagiri, “Protection from Distributed Denial of Service Attach Using History-Based IP Filtering”, in Proceedings of IEEE International Conference on Communications, Anchorage, USA, 2003, pp. 103–112.

Download references

Author information

Authors and Affiliations

Authors

Additional information

Original Russian Text © I.V. Kotenko, A.V. Ulanov, 2007, published in Izvestiya Akademii Nauk. Teoriya i Sistemy Upravleniya, 2007, No. 5, pp. 74–88.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kotenko, I.V., Ulanov, A.V. Multiagent simulation of protection of information resources in internet. J. Comput. Syst. Sci. Int. 46, 741–755 (2007). https://doi.org/10.1134/S1064230707050073

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S1064230707050073

Keywords

Navigation