Detecting and isolating inconsistently behaving agents using an intelligent control loop

  • Desktop Computing Grids provide a framework for joining in and sharing resources with others. The result is a self-organised system that typically consists of numerous distributed autonomous entities. Openness and heterogeneity postulate severe challenges to the overall system’s stability and efficiency since uncooperative and even malicious participants are free to join. In this paper, we present a concept for identifying agents with exploitation strategies that works on a system-wide analysis of trust and work relationships. Afterwards, we introduce a system-wide control loop to isolate these malicious elements using a norm-based approach – due to the agents’ autonomy, we have to build on indirect control actions. Within simulations of a Desktop Computing Grid scenario, we show that the intelligent control loop works highly successful: these malicious elements are identified and isolated with a low error rate. We further demonstrate that the approach results in a significant increaDesktop Computing Grids provide a framework for joining in and sharing resources with others. The result is a self-organised system that typically consists of numerous distributed autonomous entities. Openness and heterogeneity postulate severe challenges to the overall system’s stability and efficiency since uncooperative and even malicious participants are free to join. In this paper, we present a concept for identifying agents with exploitation strategies that works on a system-wide analysis of trust and work relationships. Afterwards, we introduce a system-wide control loop to isolate these malicious elements using a norm-based approach – due to the agents’ autonomy, we have to build on indirect control actions. Within simulations of a Desktop Computing Grid scenario, we show that the intelligent control loop works highly successful: these malicious elements are identified and isolated with a low error rate. We further demonstrate that the approach results in a significant increa se of utility for all participating benevolent agents.show moreshow less

Download full text files

Export metadata

Statistics

Number of document requests

Additional Services

Share in Twitter Search Google Scholar
Metadaten
Author:Jan Kantert, Sarah Edenhofer, Sven TomfordeGND, Jörg HähnerORCiDGND, Christian Müller-Schloer
URN:urn:nbn:de:bvb:384-opus4-477874
Frontdoor URLhttps://opus.bibliothek.uni-augsburg.de/opus4/47787
ISBN:978-989-758-122-9OPAC
Parent Title (English):Proceedings of the 12th International Conference on Informatics in Control, Automation and Robotics, July 21-23, 2015, in Colmar, Alsace, France
Publisher:SciTePress
Place of publication:Setúbal
Editor:Joaquim Filipe, Kurosh Madani, Oleg Gusikhin, Jurek Sasiadek
Type:Conference Proceeding
Language:English
Year of first Publication:2015
Publishing Institution:Universität Augsburg
Release Date:2019/02/26
Issue:Volume 1
First Page:246
Last Page:253
DOI:https://doi.org/10.5220/0005548402460253
Institutes:Fakultät für Angewandte Informatik
Fakultät für Angewandte Informatik / Institut für Informatik
Fakultät für Angewandte Informatik / Institut für Informatik / Lehrstuhl für Organic Computing
Dewey Decimal Classification:0 Informatik, Informationswissenschaft, allgemeine Werke / 00 Informatik, Wissen, Systeme / 004 Datenverarbeitung; Informatik
Licence (German):CC-BY-NC-ND 4.0: Creative Commons: Namensnennung - Nicht kommerziell - Keine Bearbeitung (mit Print on Demand)