BLOCKING UNDERHAND ATTACKS BY HIDDEN COALITIONS
Matteo Cristani, Erisa Karafili, Luca Viganò
2011
Abstract
Similar to what happens between humans in the real world, in open multi-agent systems distributed over the Internet, such as online social networks or wiki technologies, agents often form coalitions by agreeing to act as a whole in order to achieve certain common goals. However, agent coalitions are not always a desirable feature of a system, as malicious or corrupt agents may collaborate in order to subvert or attack the system. In this paper, we consider the problem of hidden coalitions, whose existence and the purposes they aim to achieve are not known to the system, and which carry out underhand attacks, a term that we borrow from military terminology. We give a first approach to hidden coalitions by introducing a deterministic method that blocks the actions of potentially dangerous agents, i.e. possibly belonging to such coalitions. We also give a non-deterministic version of this method that blocks the smallest set of potentially dangerous agents. We calculate the computational cost of our two blocking methods, and prove their soundness and completeness.
References
- A° gotnes, T., van der Hoek, W., and Wooldridge, M. (2008). Quantified coalition logic. Synthese, 165(2).
- Alur, R., Henzinger, T. A., and Kupferman, O. (1998). Alternating-time temporal logic. In Compositionality: The Significant Difference, pages 23-60. Springer.
- Aumann, R. J. and Hart, S., editors (1994). Handbook of Game Theory, volume 2. Elsevier.
- Chaum, D. (1981). Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the ACM, 24(2).
- Cristani, M., Karafili, E., and Viganò, L. (2010). Blocking Underhand Attacks by Hidden Coalitions (Extended Version). http://arxiv.org/abs/1010.4786.
- Davidsson, P. (2001). Multiagent based simulation: beyond social simulation. In Multi-Agent-Based Simulation, 1979:97-107.
- Hahn, C., Fley, B., Florian, M., Spresny, D., and Fischer, K. (2007). Social reputation: a mechanism for flexible self-regulation of multiagent systems. Journal of Artificial Societies and Social Simulation, 10.
- Kraus, S. (1997). Negotiation and cooperation in multiagent environments. Artificial Intelligence, 94:79-97.
- Oravec, V. and Fogel, J. (2006). Coalition logic of propositional control based multi agent system modeling. Proceedings of IEEE Conference on Mechatronics, pages 288-291.
- Pauly, M. (2001). Logic for social software. PhD thesis, Institute for Logic Language and Computation, University of Amsterdam.
- Pauly, M. and Parikh, R. (2003). Game logic - an overview. Studia Logica, 75(2):165-182.
- Rafaeli, S. and Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys (CSUR), 35(3):309-329.
- Sandholm, T. (2004). Agents in electronic commerce: Component technologies for automated negotiation and coalition formation. Autonomous Agents and Multi-Agent Systems, pages 73-96.
- Sorniotti, A. and Molva, R. (2010). Secret Interest Groups (SIGs) in social networks with an implementation on Facebook. In Proceedings of SAC 2010. ACM Press.
- Troquard, N., van der Hoek, W., and Wooldridge, M. (2009). A logic of games and propositional control. In Proceedings of AAMAS'09, pages 961-968. ACM Press.
- van der Hoek, W., Jamroga, W., and Wooldridge, M. (2005). A logic for strategic reasoning. In Proceedings of AAMAS'05, pages 701-708. ACM Press.
- van der Hoek, W. and Wooldridge, M. (2005). On the logic of cooperation and propositional control. Artificial Intelligence, 164(1-2):81-119.
- Wiehler, G. (2004). Mobility, Security and Web Services. Publicis Corporate Publishing.
- Wooldridge, M. and Jennings, N. (1995). Intelligent agents: Theory and practice. Knowledge Engineering Review, 10(2).
- Wooldridge, M. and Jennings, N. (1998). Pitfalls of agentoriented development. In Proceedings of Agents'98, pages 385-391. ACM Press.
Paper Citation
in Harvard Style
Cristani M., Karafili E. and Viganò L. (2011). BLOCKING UNDERHAND ATTACKS BY HIDDEN COALITIONS . In Proceedings of the 3rd International Conference on Agents and Artificial Intelligence - Volume 2: ICAART, ISBN 978-989-8425-41-6, pages 311-320. DOI: 10.5220/0003189203110320
in Bibtex Style
@conference{icaart11,
author={Matteo Cristani and Erisa Karafili and Luca Viganò},
title={BLOCKING UNDERHAND ATTACKS BY HIDDEN COALITIONS},
booktitle={Proceedings of the 3rd International Conference on Agents and Artificial Intelligence - Volume 2: ICAART,},
year={2011},
pages={311-320},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003189203110320},
isbn={978-989-8425-41-6},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 3rd International Conference on Agents and Artificial Intelligence - Volume 2: ICAART,
TI - BLOCKING UNDERHAND ATTACKS BY HIDDEN COALITIONS
SN - 978-989-8425-41-6
AU - Cristani M.
AU - Karafili E.
AU - Viganò L.
PY - 2011
SP - 311
EP - 320
DO - 10.5220/0003189203110320