8,581 research outputs found

    A consensus based network intrusion detection system

    Full text link
    Network intrusion detection is the process of identifying malicious behaviors that target a network and its resources. Current systems implementing intrusion detection processes observe traffic at several data collecting points in the network but analysis is often centralized or partly centralized. These systems are not scalable and suffer from the single point of failure, i.e. attackers only need to target the central node to compromise the whole system. This paper proposes an anomaly-based fully distributed network intrusion detection system where analysis is run at each data collecting point using a naive Bayes classifier. Probability values computed by each classifier are shared among nodes using an iterative average consensus protocol. The final analysis is performed redundantly and in parallel at the level of each data collecting point, thus avoiding the single point of failure issue. We run simulations focusing on DDoS attacks with several network configurations, comparing the accuracy of our fully distributed system with a hierarchical one. We also analyze communication costs and convergence speed during consensus phases.Comment: Presented at THE 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY 2015 IN KUALA LUMPUR, MALAYSI

    Using Computational Agents to Design Participatory Social Simulations

    Get PDF
    In social science, the role of stakeholders is increasing in the development and use of simulation models. Their participation in the design of agent-based models (ABMs) has widely been considered as an efficient solution to the validation of this particular type of model. Traditionally, "agents" (as basic model elements) have not been concerned with stakeholders directly but via designers or role-playing games (RPGs). In this paper, we intend to bridge this gap by introducing computational or software agents, implemented from an initial ABM, into a new kind of RPG, mediated by computers, so that these agents can interact with stakeholders. This interaction can help not only to elicit stakeholders' informal knowledge or unpredicted behaviours, but also to control stakeholders' focus during the games. We therefore formalize a general participatory design method using software agents, and illustrate it by describing our experience in a project aimed at developing agent-based social simulations in the field of air traffic management.Participatory Social Simulations, Agent-Based Social Simulations, Computational Agents, Role-Playing Games, Artificial Maieutics, User-Centered Design

    Building Efficient Smart Cities

    Get PDF
    Current technological developments offer promising solutions to the challenges faced by cities such as crowding, pollution, housing, the search for greater comfort, better healthcare, optimized mobility and other urban services that must be adapted to the fast-paced life of the citizens. Cities that deploy technology to optimize their processes and infrastructure fit under the concept of a smart city. An increasing number of cities strive towards becoming smart and some are even already being recognized as such, including Singapore, London and Barcelona. Our society has an ever-greater reliance on technology for its sustenance. This will continue into the future, as technology is rapidly penetrating all facets of human life, from daily activities to the workplace and industries. A myriad of data is generated from all these digitized processes, which can be used to further enhance all smart services, increasing their adaptability, precision and efficiency. However, dealing with large amounts of data coming from different types of sources is a complex process; this impedes many cities from taking full advantage of data, or even worse, a lack of control over the data sources may lead to serious security issues, leaving cities vulnerable to cybercrime. Given that smart city infrastructure is largely digitized, a cyberattack would have fatal consequences on the city’s operation, leading to economic loss, citizen distrust and shut down of essential city services and networks. This is a threat to the efficiency smart cities strive for

    IoT and Blockchain for Smart Cities

    Get PDF
    Blockchain is a Distributed Ledger Technology (DLT) that makes it possible to secure any type of transaction. This is because the information stored on the Blockchain is immutable, impeding any type of fraud or modification of the data. It was first created for Bitcoin transactions; however, the research community has realized its potential quickly, and started using it for purposes other than cryptocurrency transactions. Blockchain may even be used to secure and provide reliability to the data being transmitted between computational systems, ensuring their immutability. Given the amount of data produced within a smart city, the use of Blockchain is imperative in smart cities, as it protects them from cyberattacks and fraud. Moreover, the transparency of the information stored on Blockchain means that it helps create a more just and democratic society

    GAMA: A Spatially Explicit, Multi-level, Agent-Based Modeling and Simulation Platform

    Get PDF
    International audienceAgent-based modeling is now widely used to investigate complex systems but still lacks integrated and generic tools to support the representation of features usually associated with real complex systems, namely rich, dynamic and realistic environments or multiple levels of agency. The GAMA platform has been developed to address such issues and allow modelers, thanks to the use of a high-level modeling language, to build, couple and reuse complex models combining various agent architectures, environment representations and levels of abstraction

    The Potential Economic Impact of Avian Flu Pandemic on Taiwan

    Get PDF
    This study analyzes the potential consequences of an outbreak of avian influenza (H5N1) on Taiwan¥Šs macro economy and individual industries. Both the Input-Output (IO) Analysis Model and Computable General Equilibrium (CGE) Model are used to simulate the possible damage brought by lowering domestic consumption, export, and labor supply. The simulation results indicates that if the disease is confined within the poultry sector, then the impact on real GDP is around -0.1%~-0.4%. Once it becomes a human-to-human pandemic, the IO analysis suggests that the potential impacts on real GDP would be as much as -4.2%~-5.9% while labor demand would decrease 4.9%~6.4%. In the CGE analysis, which allows for resource mobility and substitutions through price adjustments, the real GDP and labor demand would contract 2.0%~2.4% and 2.2%~2.4%, respectively, and bringing down consumer prices by 3%. As for the individual sector, the outbreak will not only damage the poultry sector and its upstream and downstream industries, but also affect the service sectors including wholesale, retail, trade, air transportation, restaurants, as well as healthcare services. These results can be used to support public investment in animal disease control measures.Avian Flu Pandemic, Input-output Model, Computable General Equilibrium Model, Livestock Production/Industries,

    Training of Crisis Mappers and Map Production from Multi-sensor Data: Vernazza Case Study (Cinque Terre National Park, Italy)

    Get PDF
    This aim of paper is to presents the development of a multidisciplinary project carried out by the cooperation between Politecnico di Torino and ITHACA (Information Technology for Humanitarian Assistance, Cooperation and Action). The goal of the project was the training in geospatial data acquiring and processing for students attending Architecture and Engineering Courses, in order to start up a team of "volunteer mappers". Indeed, the project is aimed to document the environmental and built heritage subject to disaster; the purpose is to improve the capabilities of the actors involved in the activities connected in geospatial data collection, integration and sharing. The proposed area for testing the training activities is the Cinque Terre National Park, registered in the World Heritage List since 1997. The area was affected by flood on the 25th of October 2011. According to other international experiences, the group is expected to be active after emergencies in order to upgrade maps, using data acquired by typical geomatic methods and techniques such as terrestrial and aerial Lidar, close-range and aerial photogrammetry, topographic and GNSS instruments etc.; or by non conventional systems and instruments such us UAV, mobile mapping etc. The ultimate goal is to implement a WebGIS platform to share all the data collected with local authorities and the Civil Protectio

    A Simple-to-Use BDI Architecture for Agent-Based Modeling and Simulation

    Get PDF
    With the increase of computing power and the development of user-friendly multi-agent simulation frameworks, social simulations have become increasingly realistic. However, most agent architectures in these simulations use simple reactive models. Cognitive architectures face two main obstacles: their complexity for the field-expert modeler, and their computational cost. In this paper, we propose a new cognitive agent architecture based on the Belief-Desire-Intention paradigm integrated into the GAMA modeling platform. Based on the GAML modeling language, this architecture was designed to be simple-to-use for modelers, flexible enough to manage complex behaviors, and with low computational cost. This architecture is illustrated with a simulation of the evolution of land-use in the Mekong Delta

    Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents

    Full text link
    Autonomous wireless agents such as unmanned aerial vehicles or mobile base stations present a great potential for deployment in next-generation wireless networks. While current literature has been mainly focused on the use of agents within robotics or software applications, we propose a novel usage model for self-organizing agents suited to wireless networks. In the proposed model, a number of agents are required to collect data from several arbitrarily located tasks. Each task represents a queue of packets that require collection and subsequent wireless transmission by the agents to a central receiver. The problem is modeled as a hedonic coalition formation game between the agents and the tasks that interact in order to form disjoint coalitions. Each formed coalition is modeled as a polling system consisting of a number of agents which move between the different tasks present in the coalition, collect and transmit the packets. Within each coalition, some agents can also take the role of a relay for improving the packet success rate of the transmission. The proposed algorithm allows the tasks and the agents to take distributed decisions to join or leave a coalition, based on the achieved benefit in terms of effective throughput, and the cost in terms of delay. As a result of these decisions, the agents and tasks structure themselves into independent disjoint coalitions which constitute a Nash-stable network partition. Moreover, the proposed algorithm allows the agents and tasks to adapt the topology to environmental changes such as the arrival/removal of tasks or the mobility of the tasks. Simulation results show how the proposed algorithm improves the performance, in terms of average player (agent or task) payoff, of at least 30.26% (for a network of 5 agents with up to 25 tasks) relatively to a scheme that allocates nearby tasks equally among agents.Comment: to appear, IEEE Transactions on Mobile Computin
    • 

    corecore