Detecting and Isolating Inconsistently Behaving Agents using an Intelligent Control Loop

Jan Kantert, Sarah Edenhofer, Sven Tomforde, Jörg Hähner, Christian Müller-Schloer

Abstract

Desktop Computing Grids provide a framework for joining in and sharing resources with others. The result is a self-organised system that typically consists of numerous distributed autonomous entities. Openness and heterogeneity postulate severe challenges to the overall system’s stability and efficiency since uncooperative and even malicious participants are free to join. In this paper, we present a concept for identifying agents with exploitation strategies that works on a system-wide analysis of trust and work relationships. Afterwards, we introduce a system-wide control loop to isolate these malicious elements using a norm-based approach – due to the agents’ autonomy, we have to build on indirect control actions. Within simulations of a Desktop Computing Grid scenario, we show that the intelligent control loop works highly successful: these malicious elements are identified and isolated with a low error rate. We further demonstrate that the approach results in a significant increase of utility for all participating benevolent agents.

References

  1. Anderson, D. P. and Fedak, G. (2006). The Computational and Storage Potential of Volunteer Computing. In Proc. of CCGRID 2006, pages 73-80, Singapore. IEEE.
  2. Anglano, C., Brevik, J., Canonico, M., Nurmi, D., and Wolski, R. (2006). Fault-aware Scheduling for Bag-ofTasks Applications on Desktop Grids. In Proc. of GRID 2006, pages 56-63, Singapore. IEEE.
  3. Anglano, C., Canonico, M., Guazzone, M., Botta, M., Rabellino, S., Arena, S., and Girardi, G. (2008). Peer-toPeer Desktop Grids in the Real World: The ShareGrid Project. Proc. of CCGrid 2008, 0:609-614.
  4. Artikis, A. and Pitt, J. (2009). Specifying Open Agent Systems: A Survey. In Artikis, A., Picard, G., and Vercouter, L., editors, Engineering Societies in the Agents World IX, volume 5485 of LNCS, pages 29- 45. Springer, Saint-Etienne, FR.
  5. Bennett, J. C. and Zhang, H. (1996). WF2Q: Worst-case Fair Weighted Fair Queueing. In INFOCOM 7896. Fifteenth Annual Joint Conference of the IEEE Computer Societies. Networking the Next Generation. Proceedings IEEE, volume 1, pages 120-128, San Francisco, CA, USA. IEEE.
  6. Boella, G., Pigozzi, G., and van der Torre, L. (2009). Normative Systems in Computer Science - Ten Guidelines for Normative Multiagent Systems. In Boella, G., Noriega, P., Pigozzi, G., and Verhagen, H., editors, Normative Multi-Agent Systems, number 09121 in Dagstuhl Seminar Proceedings, pages 1-21, Dagstuhl, Germany. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany.
  7. Castelfranchi, C. and Falcone, R. (2010). Trust Theory: A Socio-Cognitive and Computational Model, volume 18. John Wiley & Sons, Chichester, UK.
  8. Chakravarti, A. J., Baumgartner, G., and Lauria, M. (2004). Application-Specific Scheduling for the Organic Grid. In Proc. of GRID 2004 Workshops, pages 146-155, Washington, DC, USA. IEEE.
  9. Choi, S., Buyya, R., Kim, H., and Byun, E. (2008). A Taxonomy of Desktop Grids and its Mapping to State of the Art Systems. Technical report, Grid Computing and Dist. Sys. Laboratory, The University of Melbourne.
  10. Choi, S., Kim, H., Byun, E., Baik, M., Kim, S., Park, C., and Hwang, C. (2007). Characterizing and Classifying Desktop Grid. In Proc. of CCGRID 2007, pages 743- 748, Rio de Janeiro, Brazil. IEEE.
  11. Conte, R., Castelfranchi, C., and Dignum, F. (1999). Autonomous Norm Acceptance. In Müller, J., Rao, A., and Singh, M., editors, Intelligent Agents V: Agents Theories, Architectures, and Languages, volume 1555 of LNCS, pages 99-112. Springer, Paris, France.
  12. Demers, A., Keshav, S., and Shenker, S. (1989). Analysis and Simulation of a Fair Queueing Algorithm. In Symposium Proceedings on Communications Architectures & Protocols, SIGCOMM 7889, pages 1-12, New York, NY, USA. ACM.
  13. Domingues, P., Sousa, B., and Moura Silva, L. (2007). Sabotage-tolerance and Trustmanagement in Desktop Grid Computing. Future Generation Computer Systems, 23(7):904-912.
  14. Governatori, G. and Rotolo, A. (2008). BIO Logical Agents: Norms, Beliefs, Intentions in Defeasible Logic. Autonomous Agents and Multi-Agent Systems, 17(1):36-69.
  15. Hardin, G. (1968). The Tragedy of the Commons. Science, 162(3859):1243-1248.
  16. Hewitt, C. (1991). Open Information Systems Semantics for Distributed Artificial Intelligence. Artificial intelligence, 47(1):79-106.
  17. Jain, R., Babic, G., Nagendra, B., and Lam, C.-C. (1996). Fairness, Call Establishment Latency and Other Performance Metrics. ATM-Forum, 96(1173):1-6.
  18. Kantert, J., Edenhofer, S., Tomforde, S., Hähner, J., and Müller-Schloer, C. (2015). Defending Autonomous Agents Against Attacks in Multi-Agent Systems Using Norms. In Proceedings of the 7th International Conference on Agents and Artificial Intelligence, pages 149-156, Lisbon, Portugal. INSTICC, SciTePress.
  19. Kantert, J., Scharf, H., Edenhofer, S., Tomforde, S., Hähner, J., and Müller-Schloer, C. (2014). A Graph Analysis Approach to Detect Attacks in Multi-Agent-Systems at Runtime. In 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems, pages 80-89, London, UK. IEEE.
  20. Klejnowski, L. (2014). Trusted Community: A Novel Multiagent Organisation for Open Distributed Systems. PhD thesis, Leibniz Universität Hannover.
  21. Müller-Schloer, C. (2004). Organic Computing: On the Feasibility of Controlled Emergence. In Proc. of CODES and ISSS'04, pages 2-5. ACM Press.
  22. Ostrom, E. (1990). Governing the Commons: The Evolution of Institutions for Collective Action. Cambridge university press, Cambridge, US.
  23. Pitt, J., Schaumeier, J., and Artikis, A. (2011). The Axiomatisation of Socio-Economic Principles for SelfOrganising Systems. In Self-Adaptive and SelfOrganizing Systems (SASO), 2011 Fifth IEEE International Conference on, pages 138-147, Michigan, US. IEEE.
  24. Rosenschein, J. S. and Zlotkin, G. (1994). Rules of Encounter: Designing Conventions for Automated Negotiation Among Computers. MIT Press, Cambridge.
  25. Savarimuthu, B. T. R. and Cranefield, S. (2011). Norm Creation, Spreading and Emergence: A Survey of Simulation Models of Norms in Multi-Agent Systems. Multiagent and Grid Systems, 7(1):21-54.
  26. Schmeck, H., Müller-Schloer, C., Çakar, E., Mnif, M., and Richter, U. (2010). Adaptivity and self-organization in organic computing systems. ACM Trans. Auton. Adapt. Syst., 5:10:1-10:32.
  27. Singh, M. P. (1999). An ontology for commitments in multiagent systems. Artificial Intelligence and Law, 7(1):97-113.
  28. Tomforde, S., Prothmann, H., Branke, J., Hähner, J., Mnif, M., Müller-Schloer, C., Richter, U., and Schmeck, H. (2011). Observation and Control of Organic Systems. In Organic Computing - A Paradigm Shift for Complex Systems, pages 325 - 338. Birkhäuser, Basel, CH.
  29. Urzica?, A. and Gratie, C. (2013). Policy-Based Instantiation of Norms in MAS. In Fortino, G., Badica, C., Malgeri, M., and Unland, R., editors, Intelligent Distributed Computing VI, volume 446 of Studies in Computational Intelligence, pages 287-296. Springer, Calabria, Italy.
  30. Van Dongen, S. M. (2001). Graph clustering by flow simulation. PhD thesis, Utrecht University.
  31. Wang, Y. and Vassileva, J. (2004). Trust-Based Community Formation in Peer-to-Peer File Sharing Networks. In Proc. on Web Intelligence, pages 341-348, Beijing, China. IEEE.
  32. Zhang, T., Ramakrishnan, R., and Livny, M. (1996). Birch: an efficient data clustering method for very large databases. In ACM SIGMOD Record, volume 25, pages 103-114, Montreal, Canada. ACM.
Download


Paper Citation


in Harvard Style

Kantert J., Edenhofer S., Tomforde S., Hähner J. and Müller-Schloer C. (2015). Detecting and Isolating Inconsistently Behaving Agents using an Intelligent Control Loop . In Proceedings of the 12th International Conference on Informatics in Control, Automation and Robotics - Volume 1: ICINCO, ISBN 978-989-758-122-9, pages 246-253. DOI: 10.5220/0005548402460253


in Bibtex Style

@conference{icinco15,
author={Jan Kantert and Sarah Edenhofer and Sven Tomforde and Jörg Hähner and Christian Müller-Schloer},
title={Detecting and Isolating Inconsistently Behaving Agents using an Intelligent Control Loop},
booktitle={Proceedings of the 12th International Conference on Informatics in Control, Automation and Robotics - Volume 1: ICINCO,},
year={2015},
pages={246-253},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005548402460253},
isbn={978-989-758-122-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 12th International Conference on Informatics in Control, Automation and Robotics - Volume 1: ICINCO,
TI - Detecting and Isolating Inconsistently Behaving Agents using an Intelligent Control Loop
SN - 978-989-758-122-9
AU - Kantert J.
AU - Edenhofer S.
AU - Tomforde S.
AU - Hähner J.
AU - Müller-Schloer C.
PY - 2015
SP - 246
EP - 253
DO - 10.5220/0005548402460253