1 / 1

Katia Sycara, PI The Intelligent Software Agents Lab softagents.ri.cmu

Legitimate client outside subnet. 1. DoS Attack. 2. Downgrade in network performance. 3. Loss of access by outside clients. 3. Legitimate outside client connects using Discovery. 2. Attacker loses connection to network host. Discovery. new IP. new IP.

genica
Download Presentation

Katia Sycara, PI The Intelligent Software Agents Lab softagents.ri.cmu

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Legitimate client outside subnet 1. DoS Attack 2. Downgrade in network performance. 3. Loss of access by outside clients 3. Legitimate outside client connects using Discovery 2. Attacker loses connection to network host. Discovery new IP new IP 1. Server changes IP address and notifies clients. Subnet connections are uninterrupted. Katia Sycara, PI The Intelligent Software Agents Lab http://www.softagents.ri.cmu.edu http://www.cs.cmu.edu/~softagents Description: The RETSINA multi-agent infrastructure is a system of heterogeneous agents that adaptively interoperate to address a variety of domain- specific problems. Each RETSINA agent draws on a sophisticated planning and reasoning architecture to interleave distributed planning, information gathering and execution within dynamic and uncertain environments. RETSINA Agents and Infrastructure components: Interact in open dynamic environments Retrieve and fuse information Dynamically form teams to plan and re-plan Interoperate with non-RETSINA systems Find agents through middle agents Interoperate with non-RETSINA systems Results: Demonstrated Dynamic and scalable middle agent infrastructure (including multiple ANSs, Matchmakers, Brokers, Facilitators, etc. through use of Discovery protocol (see opposite). Location based Discovery and services. Peer-to-peer agent interactions on mobile devices and just-in-time GUIs. Algorithms for multi-agent reinforcement learning with limited sensory information. Collaboration with other participants, including ALP, MIATA, CoAX and Teamcore. Dynamic Discovery of infrastructure and agent services Software Engineering Robotics Inst. Computer Services CMU Agents Group New Middle-Agents are discovered across WAN, and the query propagates within the LANs. English Dept. Image-Rec not found. NASA Govt. Agencies Lookup Image-Rec Agent agents Image-Rec found! Recent Developments: Socket Handoff Defense to DoS Attack Withthe Socket Handoff Defense, a targeted organization maintains the operation of the networked infrastructure during a DoS attack. A lightweight socket handoff technology allows network computers to relocate out of harm’s way by renumbering their IP network addresses. Benefits: 1. The termination of the DoS attack.Spoofed or inaccurate IP addresses will be dropped and “left behind” in the “move.” 2. Continuity of service. Relocation accomplished without interrupting services and network connections that are valid and already active. These connections will be automatically updated with the new and renumbered addresses. 3. Application transparency. Socket Handoff is implemented in the OS kernel. All network applications can benefit from it without needing to be rewritten. 4. Gradual phase-in. Allows connection to network of non-Socket- Migration-enabled Applications under normal conditions. Applications need a Socket-Handoff-established kernel to maintain a connection when the server relocates and hands off its new IP address.

More Related