An Immunological and an Ethically-social Approach to Security Mechanisms in a Multiagent System

  • Krzysztof Cetnarowicz
  • Renata Cięciwa
  • Gabriel Rojek
Part of the Advances in Soft Computing book series (AINSC, volume 35)


This article presents a discussion about security mechanisms in agent and multiagent systems. Presented discussion focuses on the design of an artificial immune system for intrusion detection in agent systems. An immunological approach to change detection seems very useful in design of security mechanisms for an agent functioning in his environment. Reasons for this expectation are the principles of a computer immune system such as distribution and autonomy. Mentioned principles of artificial immune systems are strongly connected with main principles of agent technology which are the autonomy of an agent and distribution in the case of multiagent system.


Multiagent System Intrusion Detection Agent System Autonomous Agent Intelligent Agent 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    1. Aickelin, U., Cayzer, S., (2002) The Danger Theory and Its Application to Artificial Immune Systems. In Proceedings 1st International Conference on Artificial Immune Systems (ICARIS - 2002), Canterbury, 141–148Google Scholar
  2. 2.
    2. Cetnarowicz, K., Ciêciwa, R., Nawarecki E., Rojek, G. (2005) Unfavorable Behavior Detection in Real World Systems Using the Multiagent System, In Intelligent Information Processing and Web Mining, Proceedings of the International IIS: IIPWM'05 Conference, Springer-Verlag Berlin Heidelberg, 416–420Google Scholar
  3. 3.
    3. Cetnarowicz, K., Ciêciwa, R., Rojek, G. (2005) Behavior Evaluation with Actions' Sampling in Multi-agent System, In Lecture Notes in Artificial Intelligence, Vol. 3690, Springer-Verlag Berlin Heidelberg, 490–499Google Scholar
  4. 4.
    4. Cetnarowicz, K., Rojek, G. (2004) Behavior Based Detection of Unfavorable Resources. In Lecture Notes in Computer Science, Vol. 3038, Springer-Verlag Berlin Heidelberg, 607–614Google Scholar
  5. 5.
    5. Forrest, S., Perelson, A. S., Allen L., Cherukuri R. (1994) Self-nonself Discrimination in a Computer. In Proc. of the 1994 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, 202–212Google Scholar
  6. 6.
    6. Hofmeyr, S. A., Forrest, S. (2002) Architecture for an Artificial Immune System. Evolutionary Computation, vol. 7, no. 1, 45–68Google Scholar
  7. 7.
    7. Kagal L., Joshi A., Finin T. (2002) Developing Secure Agent Systems Using Delegation Based Trust Management. In Security of Mobile MultiAgent Systems (SEMAS 02) held at Autonomous Agents and MultiAgent Systems (AAMAS 02), available at: Scholar
  8. 8.
    8. Matzinger, P. (1994) Tolerance Danger and the Extended Family, In Annual Reviews of Immunology, Vol. 12, 991–104Google Scholar
  9. 9.
    9. Matzinger, P. (2002) The Danger Model: A Renewed Sense of Self, In Science Vol. 296. no. 5566, 301–305CrossRefGoogle Scholar
  10. 10.
    10. Rojek, G., Cięciwa, R., Cetnarowicz, K. (2005) Algorithm of Behavior Evaluation in Multi-agent System, In Lecture Notes in Computer Science, Vol. 3516, Springer-Verlag Berlin Heidelberg, 711–718Google Scholar
  11. 11.
    11. Somayaji, A., Hofmeyr, S., Forrest, S. (1998) Principles of a Computer Immune System, in Meeting on New Security Paradigms, 23–26 Sept. 1997, Langdale, UK, New York, NY, USA : ACM, 75–82Google Scholar
  12. 12.
    12. Sycara K., Paolucci M., van Velsen M., Giampapa J. (2001) The RETSINA MAS Infrastructure, Technical Report CMU-RI-TR-01-05, Robotics Institute Technical Report, Carnegie MellonGoogle Scholar
  13. 13.
    13. Sycara K., Wong H.C. (1999) Adding Security and Trust to Multi-Agent Systems. In Proceedings of Autonomous Agents '99 Workshop on Deception, Fraud, and Trust in Agent Societies, May, 1999, 149–161Google Scholar
  14. 14.
    14. Wierzchoń, S. T. (2001) Sztuczne systemy immunologiczne: teoria i zastosowania. Akademicka Oficyna Wydawnicza Exit, WarszawaGoogle Scholar
  15. 15.
    15. Wooldridge, M., Jennings, N. R. (1997) Intelligent agents: Theory and practice. The Knowledge Engineering Review, 10(2), 115–152CrossRefGoogle Scholar

Copyright information

© Springer 2006

Authors and Affiliations

  • Krzysztof Cetnarowicz
    • 1
  • Renata Cięciwa
    • 2
  • Gabriel Rojek
    • 3
  1. 1.Institute of Computer ScienceAGH University of Science and TechnologyKrakówPoland
  2. 2.Department of Computer NetworksNowy Sącz School of Business — National-Louis UniversityNowy SączPoland
  3. 3.Department of Computer Science in IndustryAGH University of Science and TechnologyKrakówPoland

Personalised recommendations