were actual physical sensors. Sensors such as those
that measure power consumption, temperature,
humidity, air pressure, wind speed, perhaps digital
camera, motion detectors, or just about anything that
digitally records a physical parameter can be used.
Examples of correlating such data would be to
generate an alert if the temperature dropped more
than ten degrees in an hour. This type of system
could be part of an IDS, a means to protect
equipment sensitive to changes in
weather/conditions, etc.
• Alert conditions (holistic vs. local)
By correlating sensor data across the entire
network, we can potentially generate one alert
condition for a local host or subnet and a different
alert condition for the entire network. A local alert
condition may be high if hacker penetration is
eminent, but the services on the affected host are
minimal enough that the host’s compromise would
not provide the hacker with much useful
information. For example, an agent is monitoring a
honeypot and an intrusion is detected. The result
would be a low alert condition for the network.
Also, we could change the rule set that an agent uses
based on the alert level - additional parameters could
be monitored, certain events could automatically be
forwarded to the CLF of the “uber-agent”, etc.
Another example, in an IDS application, if a
subnet was recently port scanned, it might set its
alert condition to “red” and use a looser set of rules
that would otherwise have generated a high number
of false positives. Other agents within the system
could be notified of the threat and adjust their threat
condition accordingly. The alert condition for high-
value targets would be set to “red”, some subnets
might increase to “amber”, and low-value systems
might not change at all.
In an environmental monitoring system, perhaps
the agents query sensor logs once every 15 minutes.
If one of the sensors record a drastic change
(temperature, air pressure, etc.) within one or more
monitoring periods, the agents could be set to query
the sensor logs once every minute.
5 CONCLUSIONS
A multiagent architecture shows great potential for
solving problems in a distributed manner that a
single agent could not process in a timely manner.
Research in this area tends to focus on ways to
implement a cooperative artificial intelligence. The
architecture presented in this paper provides a means
to separate the AI from the other important aspects
of a multiagent system. The modular design allows
for easy research, testing, and application of
distributed AI systems in a variety of contexts. The
scalability, simplicity, security, and robust nature of
the architecture provide a common structure in
which to compare and contrast competing paradigms
for learning, cooperation, network timing, etc.
REFERENCES
Balasubramaniyan, J., Garcia-Fernandez, J., Isacoff, D.,
Spafford, E., Zamboni, D. (1998, December). An
Architecture for Intrusion Detection using Autonomous
Agents. Proceedings of the Fourteenth Annual
Computer Security Applications Conference, pages 13-
24. IEEE Computer Society. Retrieved from http://
www.cse.buffalo.edu/~sbraynov/seminar%202004/pap
ers/zamboni-agents1.pdf
Chatzigiannakis, V., Androulidakis, G., Grammatikou, M.,
Maglaris, B. (2004, June) A Distributed Intrusion
Detection Prototype using Security Agents. In 11th
Workshop of the HPOVUA.
Einwechter, N. (2001, January 8).An Introduction to
Distributed Intrusion Detection Systems. Retrieved
from http://online.securityfocus.com/infocus/1532.
Gopalakrishna, R., Spafford, E. (2001) A Framework for
Distributed Intrusion Detection using Interest Driven
Cooperating Agents. Purdue University. Retrieved
from http://www.raid-symposium.org/raid2001/slides/
gopalakrishna_spafford_raid2001.pdf.
Karp, R., J. Elson, D. Estrin, and S. Shenker. (2003, April
11). Optimal and Global Time Synchronization in
Sensornets. Center for Embedded Networked Sensing
Technical Report 0012. Retrieved from http://www.
eecs.harvard.edu/~mdw/course/cs263/fa03/papers/time
sync-techrept03.pdf.
Kerschbaum, F., Spafford, E., Zamboni, D. (2000,
November). Using embedded sensors for detecting
network attacks. Proceedings of the First ACM
Workshop on Intrusion Detection Systems. Retrieved
from http://www.cerias.purdue.edu/homes/zamboni/
pubs/wids2000.pdf.
Maes, P. (1992) Modeling Adaptive Autonomous Agents.
Artificial Life Journal, Vol 1, No 1&2, pp 135-162.
MIT Press.
Silva, C., R. Pinto, J. Castro, and P. Tedesco. (2003,
November 27-28). Requirements for Multi-Agent
Systems. Workshop em Engenharia de Requisitos,
Piracicaba-SP, pp 198-212.
Sycara, K. (1998) Multiagent Systems. AI Magazine, Vol
19, No 2. pp. 78-92. Retrieved from http://www-
2.cs.cmu.edu/~softagents/papers/multiagentsystems.PD
F.
ICEIS 2005 - ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS
238