Adversarial Organization Modeling for Network Attack/Defense

  • Ji Wu
  • Chaoqun Ye
  • Shiyao Jin
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3903)


To appropriately address the problem of large-scale distributed cyber attacks and defenses, issues such as information exchange, work division and coordination must be addressed. We believe that focusing on logical foundations for information assurance construction provides the theme that drives how various defense components work together. This paper proposes an opponent agent’s mental model based on the theory of Belief-Desire-Intention, adopts the notions of agent, group and role to specify the organizational structure of distributed network attacks/defenses, and applies the computational framework of agent team to model organizational dynamics of network attacks/defenses.


Intrusion Detection Team Operator Intrusion Detection System Plan Execution Joint Intention 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Rao, A.S., Georgeff, M.P.: Modeling Rational Agents Within A BDI-architecture. In: Proceedings of the Second Conference on Knowledge Representation and Reasoning, pp. 473–484. Morgan Kaufman, San Francisco (1991)Google Scholar
  2. 2.
    Chen, J., Tang, H., Hu, M.: An Extended BDI Logic for Modeling Multiagent Communication. Journal of Software (Chinese) 10, 778–784 (1999)Google Scholar
  3. 3.
    Ferber, J., Gutknecht, O., Michel, F.: From Agents to Organizations: An Organizational View of Multi-agent Systems. In: Giorgini, P., Müller, J.P., Odell, J.J. (eds.) AOSE 2003. LNCS, vol. 2935, pp. 214–230. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  4. 4.
  5. 5.
    Kruegel, C., Toth, T.: Applying Mobile Agent Technology to Intrusion Detection. In: Proceedings of the ICSE Workshop on Software Engineering and Mobility, Canada (2001)Google Scholar
  6. 6.
    Kruegel, C., Toth, T.: Distributed Pattern Detection for Intrusion Detection. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2002 (2002)Google Scholar
  7. 7.
    Balasubramaniyan, S., Garcia-Fernandez, J.O., Isaco, D., Spafford, E., Zamboni, D.: An Architecture for Intrusion Detection using Autonomous Agents. In: 14th IEEE Computer Security Applications Conference, pp. 13–24 (1998)Google Scholar
  8. 8.
    Ragsdale, D.J., Carver, C.A., Humphries, J.W., Pooh, U.W.: Adaptation Techniques for Intrusion Detection and Intrusion Response systems. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, pp. 2344–2349 (2000)Google Scholar
  9. 9.
    Levesque, H.J., Cohen, P.R., Nunes, J.: On Acting Together. In: Proceedings of the National Conference on Artificial Intelligence. AAAI press, Menlo Park (1990)Google Scholar
  10. 10.
    Tambe, M.: Agent Architectures for Flexible, Practical Teamwork. In: Proceedings of the National Conference on Artifcial Intelligence. AAAI Press, Menlo Park (1997)Google Scholar
  11. 11.
    Kotenko, I.: Agent-Based Modeling and Simulation Of Cyber-Warfare: Between Malefactors And Security. In: Proceedings of 19th European conference on modeling and simulation, ECMS (2005)Google Scholar
  12. 12.
    Kotenko, I., Ulanov, A.: Multi-Agent Modeling and Simulation of Agents’ Competition for Network Resources Availability. In: Proceedings of 2nd International Workshop on Safety and Security in Multi-agent Systems, SASEMAS 2005 (2005)Google Scholar
  13. 13.
    Newell, A.: Unified Theories of Cognition. Harvard Univ. Press (1990)Google Scholar
  14. 14.
    Tambe, M.: Towards flexible teamwork. Journal of Artificial Intelligence Research 7, 83–124 (1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Ji Wu
    • 1
  • Chaoqun Ye
    • 1
  • Shiyao Jin
    • 1
  1. 1.Collage of Computer Science and TechnologyNational University of Defense TechnologyChangshaChina

Personalised recommendations