In this paper, we study coordinated attacks launched by multiple malicious agents and the problem of detecting ma-licious groups of attackers. The paper proposes a formal method and an algorithm for detecting action interference between users. It has to be pointed out that some members of a malicious group may not necessarily perform illegal ac-tions, for example, they can prepare and organize an attack without taking active part in the actual attack execution. In addition, members of a malicious group may not necessar-ily know each other. The method we propose tries to solve these problems by building a coordination graph which in-cludes all users who, in some way or another, cooperate with each other, i.e., the maximal malicious group of ...
SUMMARY The social network model has been re-garded as a promising mechanism to defend against Sybil...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
This paper deals with a topology for a class of interconnected systems, referred to as a highly inte...
In this paper we analyze the coordinated port scan attack where a single adversary coordinates a Gro...
The study of trust and cooperation is a major component of multi-agent systems research. Such work o...
This paper presents the first wide-scale study of correlated attacks, i.e., attacks mounted by the s...
In this paper we address the problem of detecting faulty behaviors of cooperative mobile agents. A n...
Multi-Agent Computation In this paper we improve the model for secure multi-agent computation propos...
In this paper we address the problem of detecting faulty behaviors of cooperative mobile agents. A n...
In this paper we propose an architecture for using cross-organization information sharing to identif...
Intrusion Detection Systems (IDS), designed during the early era of the Internet to protect against ...
Abstract: Similar to what happens between humans in the real world, in open multi-agent systems dist...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
SUMMARY The social network model has been re-garded as a promising mechanism to defend against Sybil...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
This paper deals with a topology for a class of interconnected systems, referred to as a highly inte...
In this paper we analyze the coordinated port scan attack where a single adversary coordinates a Gro...
The study of trust and cooperation is a major component of multi-agent systems research. Such work o...
This paper presents the first wide-scale study of correlated attacks, i.e., attacks mounted by the s...
In this paper we address the problem of detecting faulty behaviors of cooperative mobile agents. A n...
Multi-Agent Computation In this paper we improve the model for secure multi-agent computation propos...
In this paper we address the problem of detecting faulty behaviors of cooperative mobile agents. A n...
In this paper we propose an architecture for using cross-organization information sharing to identif...
Intrusion Detection Systems (IDS), designed during the early era of the Internet to protect against ...
Abstract: Similar to what happens between humans in the real world, in open multi-agent systems dist...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form...
Computer network attackers chain system exploits together to achieve their goals, which range from s...
SUMMARY The social network model has been re-garded as a promising mechanism to defend against Sybil...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
This paper deals with a topology for a class of interconnected systems, referred to as a highly inte...