Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2772879.2773304acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article

Cybersecurity as an Application Domain for Multiagent Systems

Published: 04 May 2015 Publication History

Abstract

The science of cybersecurity has recently been garnering much attention among researchers and practitioners dissatisfied with the ad hoc nature of much of the existing work on cybersecurity. Cybersecurity offers a great opportunity for multiagent systems research. We motivate cybersecurity as an application area for multiagent systems with an emphasis on normative multiagent systems. First, we describe ways in which multiagent systems could help advance our understanding of cybersecurity and provide a set of principles that could serve as a foundation for a new science of cybersecurity. Second, we argue how paying close attention to the challenges of cybersecurity could expose the limitations of current research in multiagent systems, especially with respect to dealing with considerations of autonomy and interdependence.

References

[1]
N. Alechina, M. Dastani, and B. Logan. Reasoning about normative update. In Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI), pages 20--26, Beijing, Aug. 2013.
[2]
N. Alechina, M. Dastani, and B. Logan. Norm approximation for imperfect monitors. In Proceedings of the 13th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), pages 117--124. IFAAMAS, 2014.
[3]
G. Andrighetto, G. Governatori, P. Noriega, and L. W. N. van der Torre, editors. Normative Multi-Agent Systems, volume 4 of Dagstuhl Follow-Ups. Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2013.
[4]
A. Artikis, M. J. Sergot, and J. V. Pitt. Specifying norm-governed computational societies. ACM Transactions on Computational Logic, 10(1):1:1--1:42, Jan. 2009.
[5]
L. E. Bassham and W. T. Polk. Threat assessment of malicious code and human threats. http://csrc.nist.gov/publications/nistir/threats/threats.html, Mar. 1994. Computer Security Division, National Institute of Standards and Technology.
[6]
J. M. Buchanan. An economic theory of clubs. Economica, 32(125):1--14, Feb. 1965.
[7]
B. Burgemeestre and J. Hulstijn. Designing for accountability and transparency: A value-based argumentation approach. In J. van den Hoven, P. E. Vermaas, and I. van de Poel, editors, Handbook of Ethics, Values, and Technological Design: Sources, Theory, Values and Application Domains, chapter 15, pages 1--28. Springer, Berlin, 2015.
[8]
C. Castelfranchi and R. Falcone. Trust Theory: A Socio-Cognitive and Computational Model. Agent Technology. John Wiley & Sons, Chichester, United Kingdom, 2010.
[9]
L. Chen, J. Crampton, M. Kollingbaum, and T. Norman. Obligations in risk-aware access control. In Proceedings of the 10th Annual International Conference on Privacy, Security and Trust (PST), pages 145--152, Paris, July 2012. IEEE Computer Society.
[10]
C. Cheshire. Online trust, trustworthiness, or assurance. Dædalus, the Journal of the American Academy of Arts & Sciences, 140(4):49--58, Fall 2011.
[11]
A. K. Chopra, E. Paja, and P. Giorgini. Sociotechnical trust: An architectural approach. In Proceedings of the 30th International Conference on Conceptual Modeling (ER), volume 6998 of Lecture Notes in Computer Science, pages 104--117, Brussels, 2011. Springer.
[12]
L. F. Cranor and S. Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O'Reilly, Sebastopol, California, 2005.
[13]
C. M. de Melo, P. Carnevale, S. Read, D. Antos, and J. Gratch. Bayesian model of the social effects of emotion in decision-making in multiagent systems. In Proceedings of the 11th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), pages 55--62, Valencia, Spain, June 2012.
[14]
S. K. D'Mello, A. C. Strain, A. Olney, and A. C. Graesser. Affect, meta-affect, and affect regulation during complex learning. In R. Azevedo and V. Aleven, editors, International Handbook of Metacognition and Learning Technologies, volume 28 of Springer International Handbooks of Education, chapter 44, pages 669--681. Springer, Amsterdam, 2013.
[15]
Z. Dong, V. Garg, L. J. Camp, and A. Kapadia. Pools, clubs and security: Designing for a party not a person. In Proceedings of the New Security Paradigms Workshop (NSPW), pages 77--86, Bertinoro, Italy, Sept. 2012.
[16]
H. Du and M. N. Huhns. Determining the effect of personality types on human-agent interactions. In Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT), pages 239--244, Atlanta, Nov. 2013. IEEE Computer Society.
[17]
H. Du, B. Y. Narron, N. Ajmeri, E. Berglund, J. Doyle, and M. P. Singh. Understanding sanction under variable observability in a secure, collaborative environment. In Proceedings of the International Symposium and Bootcamp on the Science of Security (HotSoS), Urbana, Illinois, Apr. 2015. ACM. To appear.
[18]
J. R. Dunn and M. E. Schweitzer. Feeling and believing: The influence of emotion on trust. Journal of Personality and Social Psychology, 88(5):736--748, May 2005.
[19]
J. Feigenbaum, J. Hendler, A. D. Jaggard, D. J. Weitzner, and R. N. Wright. Accountability and deterrence in online life (extended abstract). In Proceedings of the 3rd International Web Science Conference, pages 7:1--7:7, Koblenz, June 2011. ACM Press.
[20]
J. Feigenbaum, A. D. Jaggard, and R. N. Wright. Open vs. closed systems for accountability. In Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS), pages 4:1--4:11, Raleigh, North Carolina, Apr. 2014. ACM Press.
[21]
Y. Gal, B. Grosz, S. Kraus, A. Pfeffer, and S. M. Shieber. Agent decision-making in open-mixed networks. Artificial Intelligence, 174(18):1460--1480, Dec. 2010.
[22]
N. Guiraud, D. Longin, E. Lorini, S. Pesty, and J. Rivière. The face of emotions: A logical formalization of expressive speech acts. In Proceedings of the 10th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), pages 1031--1038, Taipei, May 2011.
[23]
HotSoS. Symposium and Bootcamp on the Science of Security. http://cps-vo.org/group/hotsos2014, 2014.
[24]
S. Ingolfo, I. Jureta, A. Siena, A. Perini, and A. Susi. Nòmos 3: Legal compliance of roles and requirements. In Proceedings of the 33rd International Conference on Conceptual Modeling (ER), volume 8824 of Lecture Notes in Computer Science, pages 275--288, Atlanta, Oct. 2014. Springer.
[25]
ITU. Recommendation X.509 - information technology - open systems interconnection - the directory: Public-key and attribute certificate frameworks. Article Number E 19454, International Telecommunication Union, Aug. 2001.
[26]
P. Kazmierczak, T. Pedersen, and T. Ågotnes. NORMC: A norm compliance temporal logic model checker. In Proceedings of the Sixth Starting AI Researchers' Symposium (STAIRS), pages 168--179, 2012.
[27]
P. Kumaraguru, S. Sheng, A. Acquisti, L. F. Cranor, and J. I. Hong. Teaching Johnny not to fall for phish. ACM Transactions on Internet Technology, 10(2):7:1--7:31, May 2010.
[28]
S. Marinovic, N. Dulay, and M. Sloman. Rumpole: An introspective break-glass access control language. ACM Transactions on Information and System Security (TISSEC), 17(1):2:1--2:31, Aug. 2014.
[29]
J. Morales, M. López-Sánchez, J. A. Rodriguez-Aguilar, M. Wooldridge, and W. Vasconcelos. Automated synthesis of normative systems. In Proceedings of the 12th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), pages 483--489, St. Paul, Minnesota, May 2013. IFAAMAS.
[30]
E. Ostrom. Governing the Commons: The Evolution of Institutions for Collective Action. Number 4 in The Political Economy of Institutions and Decisions. Cambridge University Press, Cambridge, United Kingdom, 1990.
[31]
J. Rowe, K. Levitt, S. D. Parsons, E. I. Sklar, A. Applebaum, and S. Jalal. Argumentation logic to assist in security administration. In Proceedings of the New Security Paradigms Workshop (NSPW), pages 43--52, New York, 2012. ACM.
[32]
B. T. R. Savarimuthu and S. Cranefield. Norm creation, spreading and emergence: A survey of simulation models of norms in multi-agent systems. Multiagent and Grid Systems, 7(1):21--54, 2011.
[33]
H. Simon. The Sciences of the Artificial. MIT Press, Cambridge, Massachusetts, 3rd edition, 1996.
[34]
M. P. Singh. Trust as dependence: A logical approach. In Proceedings of the 10th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), pages 863--870, Taipei, May 2011. IFAAMAS.
[35]
M. P. Singh. Norms as a basis for governing sociotechnical systems. ACM Transactions on Intelligent Systems and Technology (TIST), 5(1):21:1--21:23, Dec. 2013.
[36]
SoS. Science of Security: An online community to advanced cyber-security science. http://cps-vo.org/group/SoS, 2014.
[37]
N. A. M. Tinnemeier, M. Dastani, and J.-J. C. Meyer. Programming norm change. In Proceedings of the 9th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), pages 957--964, Toronto, 2010. IFAAMAS.
[38]
A. Tversky and D. Kahneman. The framing of decisions and the psychology of choice. Science, 211(4481):453--458, Jan. 1981.
[39]
W. W. Vasconcelos, M. J. Kollingbaum, and T. J. Norman. Normative conflict resolution in multi-agent systems. Journal of Autonomous Agents and Multi-Agent Systems (JAAMAS), 19(2):124--152, Oct. 2009.
[40]
Y. Wang, P. G. Leon, A. Acquisti, L. F. Cranor, A. Forget, and N. M. Sadeh. A field trial of privacy nudges for Facebook. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI), pages 2367--2376. ACM, 2014.
[41]
L. Zhang-Kennedy, S. Chiasson, and R. Biddle. Stop clicking on "update later": Persuading users they need up-to-date antivirus protection. In A. Spagnolli, L. Chittaro, and L. Gamberini, editors, Persuasive Technology, volume 8462 of Lecture Notes in Computer Science, pages 302--322. Springer, 2014.

Cited By

View all
  • (2020)New Foundations of Ethical Multiagent SystemsProceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3398761.3398958(1706-1710)Online publication date: 5-May-2020
  • (2019)Applying Norms and Sanctions to Promote Cybersecurity HygieneProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3331987(1991-1993)Online publication date: 8-May-2019
  • (2019)SuppleProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3331769(781-789)Online publication date: 8-May-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AAMAS '15: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems
May 2015
2072 pages
ISBN:9781450334136

Sponsors

  • IFAAMAS

In-Cooperation

Publisher

International Foundation for Autonomous Agents and Multiagent Systems

Richland, SC

Publication History

Published: 04 May 2015

Check for updates

Author Tags

  1. cybersecurity
  2. norms
  3. organizations
  4. trust

Qualifiers

  • Research-article

Funding Sources

  • United States Department of Defense

Conference

AAMAS'15
Sponsor:

Acceptance Rates

AAMAS '15 Paper Acceptance Rate 108 of 670 submissions, 16%;
Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2020)New Foundations of Ethical Multiagent SystemsProceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3398761.3398958(1706-1710)Online publication date: 5-May-2020
  • (2019)Applying Norms and Sanctions to Promote Cybersecurity HygieneProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3331987(1991-1993)Online publication date: 8-May-2019
  • (2019)SuppleProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3331769(781-789)Online publication date: 8-May-2019
  • (2018)Sociotechnical Systems and Ethics in the LargeProceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society10.1145/3278721.3278740(48-53)Online publication date: 27-Dec-2018
  • (2016)SilkProceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence10.5555/3060621.3060674(373-379)Online publication date: 9-Jul-2016
  • (2016)CustardProceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems10.5555/2936924.2937085(1096-1105)Online publication date: 9-May-2016
  • (2016)From Social Machines to Social ProtocolsProceedings of the 25th International Conference on World Wide Web10.1145/2872427.2883018(903-914)Online publication date: 11-Apr-2016
  • (2015)Norms as a basis for governing sociotechnical systemsProceedings of the 24th International Conference on Artificial Intelligence10.5555/2832747.2832842(4207-4211)Online publication date: 25-Jul-2015
  • (2015)Generalized Commitment AlignmentProceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems10.5555/2772879.2772938(453-461)Online publication date: 4-May-2015

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media