2004
DOI: 10.1007/978-3-540-24688-6_79
|View full text |Cite
|
Sign up to set email alerts
|

Behavior Based Detection of Unfavorable Resources

Abstract: This article considers a problem of security in a computer systems in context of some mechanisms which act in societies and which mechanisms are seen as being useful to assure security in a computer system. A new approach to the security problem is discussed, which refers to identifying computer resource (e.g. agent, program) on the basis of this resource behaviour (actions which this resource undertakes). Mechanisms are presented, which may enable to recognize and dismiss resources undesirable or harmful in t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2005
2005
2009
2009

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 2 publications
(3 reference statements)
0
6
0
Order By: Relevance
“…Presented in [4] simulations are more adequate to a real-world multi-agent system. In that simulations all actions of agents are asynchronous.…”
Section: Problem Of Distributed Behavior Evaluationmentioning
confidence: 99%
See 4 more Smart Citations
“…Presented in [4] simulations are more adequate to a real-world multi-agent system. In that simulations all actions of agents are asynchronous.…”
Section: Problem Of Distributed Behavior Evaluationmentioning
confidence: 99%
“…-type g=0 -agents which take one unit of randomly selected (A-50%, B-50%) resource in every full life cycle; -type g=1 -agents which take one unit of randomly selected (A-75%, B-25%) resource in every full life cycle; type g=1 agents can be treated as intruders, because increased probability of undertaking only actions of one type can cause blocking the system (what is presented in [3,4]); -type g=2 -agents which take one unit of A resource in every full life cycle; type g=2 agents are also called intruders.…”
Section: Algorithms Of Distributed Behavior Evaluationpropositions Anmentioning
confidence: 99%
See 3 more Smart Citations