SlideShare a Scribd company logo
1 of 15
Download to read offline
Financial Critical Infrastructure: A MAS
Trusted Architecture for Alert Detection and
Authenticated Transactions
Guy Guemkam (Guy.Guemkam@tudor.lu)āˆ—
Christophe Feltus (Christophe.Feltus@tudor.lu)āˆ—
CĆ©dric Bonhomme (Cedric.Bonhomme@tudor.lu)āˆ—
Pierre Schmitt (Pierre.Schmitt@tudor.lu)āˆ—
Benjamin GĆ¢teau (Benjamin.Gateau@tudor.lu)āˆ—
Djamel Khadraoui (Djamel.Khadraoui@tudor.lu)āˆ—
Zahia Guessoum (Zahia.Guessoum@lip6.fr)ā€ 
Abstract: Banking and ļ¬nancial system constitute a critical service for our economy. Being
able to foreseen real time attacks and failures on ļ¬nancial institutions network is a crucial
challenge. In order to face those problems, research tends to elaborate alert mechanisms
in order to support risk assessment, analysis and mitigation solution for real time decision-
making processes. Our previous works had proposed a multi-agent based architecture to
support that alert mechanism. This architecture exploited the Multi-agent system technology
and proposes a static assignment of functions to agents. This static assignment was a
weakness because isolating an agent or breaking the communication channel between two
of them created serious damage on the crisis management. In this paper, we complete
our previous works and make mobile the assignment of functions to agents. Our approach
exploits the concept of agent responsibility that we assigned dynamically to agent taking
into consideration the agent trust. This mobile assignement is illustrated by a case study
that aims at adopting agentā€™s secret key according to the sensibility of the ļ¬nancial context.
Keywords: trust model; responsibility; multi-agent system; bank clearing; ļ¬nancial critical
infrastructure
1 Introduction
Infrastructures are the basic physical and organizational structures needed for the func-
tioning of a community or society, such as banking and ļ¬nancial systems. These Critical
Financial Infrastructures (e.g. payment systems and clearing houses) are characterized
by being so vital to a country that the incapacity or destruction of such systems would
have a debilitating impact on security, national economic security, national public safety,
or a combination of these [Rin04]. In fact, the ļ¬nancial critical infrastructure (FCI) are
so important that a signiļ¬cant eļ¬€ort in making sure that they are not damaged or de-
stroyed justiļ¬es the uprising research in that ļ¬eld. Additionally, managing the security
āˆ— Public Research Centre Henri Tudor, Luxembourg-Kirchberg, Luxembourg
ā€  Laboratoire IP6, UniversitĆ© Pierre et Marie Curie, Paris, France
Submitted to SAR-SSI 2011 1
G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. GĆ¢teau, Z. Guessoum, D. Khadraoui
of FCI systems is a diļ¬ƒcult task oļ¬€ering numerous research challenges because they are
traditionally characterized by (see Fig. 1):
ā€¢ deployed on large and complex inter-institutions network, making it diļ¬ƒcult to cover
all potential vulnerabilities which can be exploited to launch cyber-attacks against
them;
ā€¢ a very strong availability requirement, i.e. FCI systems can rarely be taken down.
This can make them hard to maintain, and consequently many critical infrastructure
systems run on out-dated technology which may not have been geared to cope with
the threat picture of today;
ā€¢ a major request concerns the conļ¬dentiality of the message, i.e. bank secrecy is
extremely signiļ¬cant for the private operations, and for the state transactions as
well. Continuously monitoring and adapting Public Key Infrastructure (PKI) is
mandatory.
Fig. 1: FCI security challenge
Many critical infrastructure systems including FCI are exposed to the Internet, making
cyber attacks a very real problem. According to a recent study on critical infrastructure
cyber attacks [BWIM09], ā€œcritical infrastructure owners and operators report that their IT
networks are under repeated cyber attack, often by high-level adversaries. The impacts of
such attacks are often severe, and their cost is high and borne widelyā€œ.
The situation of the FCI is that from the IT side, conceptual security is achieved via
security technology watch in order to manage new vulnerabilities and avoiding new threats
by the introduction of adapted security counter measures into the operational critical el-
ements of the infrastructure. Associated to this, the security controls are also frequently
deployed (mainly via audits) on top of the two previous actions, in order to measure the
conļ¬dence that they have on the security in place. The ultimate goal here is to guarantee
that the required controls are properly in place and that the security counter measures
and PKI regulation are adapted to the risk situations. Beside this, in certain cases, these
2 Submitted to SAR-SSI 2011
FCI: A MAS Trusted Architecture for Alert Detection and Authenticated Transaction
critical infrastructures are interdependent (clearing processing and data exchanges) and
therefore additional complex security risks are to be considered. From the business side,
the FCI owners are more and more subject to speciļ¬c regulations requiring them to main-
tain an assessment and ongoing management of systemic risks by the national ļ¬nancial
supervision institutions [Act02, Bas06]. A systemic risk, as deļ¬ned by the European par-
liament, is a risk of disruption in the ļ¬nancial system with the potential to have serious
negative consequences for the internal market and the real economy. All types of ļ¬nancial
intermediaries, markets and infrastructure may be potentially systemically important.
Our state of the art in this ļ¬eld [FKA10] has highlighted that many architectures has
already been elaborated to support the reaction after problem detection. Those architec-
tures are mostly elaborated based on a multi-agent system (MAS) approach that oļ¬€ers the
possibility to work in a decentralized and heterogeneous environment. However, we have
observed that those architectures are based on a static assignment of functions to agents.
As a consequence, isolating an agent or breaking the communication channel between two
of them could create serious damage on the management of the crisis. In this paper, we
propose an innovative approach for making dynamic the assignment of functions to agents.
Our approach exploits the concept of agent responsibility that we dynamically assign de-
pending on the crisis situation. Additionally, the crisis context makes vary the agent
ability to react (e.g. agent momentary isolated or decreased capability to quickly react).
In order to consider that constraints, we introduce the agent trust based on reputation as
a parameter that inļ¬‚uence the assignment.
Section 2 depicts the reaction mechanism case study. Section 3 presents the respon-
sibilities model and section 4 the responsibility to agent assignment function. Section 5
introduces the trust and reputation calculus method and section 6 the dynamic assignment
of responsibilities to agents based on the reputation.
2 Reaction mechanism case study
The agents that compose the architecture are the following:
ā€¢ The ACE collects, aggregates and analyses network informations coming from probes
deployed over the network and customer node. Conļ¬rmed alerts are sent to the
Policy Instantiation Engine (PIE);
ā€¢ The PIE receives conļ¬rmed alert from the ACE, sets the severity level and the extent
of the network response (depending on the alert layer). The PIE instantiates high
level alert messages which have to be deployed. Finally the high level alert messages
are transferred to the Reaction Deployment Point (RDP);
ā€¢ The RDP (Fig. 3) is composed of two modules. The Cryptography Analysis (CA)
is in charge of analyzing the keys previously instantiated by the PIE. Therefore, the
Crypto Status stores required properties for a secure asymetric key so that the CA
module is able to check the eligibilty of the newly received key to be deployed. Con-
cretely the CA will check the key strength, if the key has not been used or revoked,
test if the cryptographic key is not badly generated (modulus-facotrization, etc.).
The second module, the Component Conļ¬guration Mapper, selects the appropriate
communication channel.
Submitted to SAR-SSI 2011 3
G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. GĆ¢teau, Z. Guessoum, D. Khadraoui
The reaction mechanism (Fig. 2) aims at adapting the ciļ¬€ering of the data according
to the bank interface whenever on alert occurs. This section presents the core components
of the reaction mechanism. Agents are disseminated on three layers corresponding to
the clearing mechanism1
(customer/issuer, acquiring/issuing processing) and they retrieve
information from probes located at the network layer and representing diļ¬€erent values:
network traļ¬ƒc, DoS attack (denial-of-service attack, an attempt to make a computer
resource unavailable to its intended users), suspicious connections attempts, ... .
Fig. 2: Reaction mechanism inside
Fig. 3: RDP architecture
Fig. 4: SAVP architecture
Fig. 4 presents two diļ¬€erent kinds of Signature Agent Veriļ¬cation Point (SAVP).
Indeed, another advantage of MAS is that it is easy to implement from a model, speciļ¬c
1 Clearing denotes all activities from the time a commitment is made for a transaction until is settled.
4 Submitted to SAR-SSI 2011
FCI: A MAS Trusted Architecture for Alert Detection and Authenticated Transaction
agents in order to performs speciļ¬c tasks. Concretely it is adapted to the usage and
practical deployment in that it coincides (e.g. shop terminal, smartphone, ATM, etc.) and
sends alerts to appropriate level (cutsomer, processing, clearing). Moreover, our attack
prevention system is easily extensible for future interface category. SAVPs receive generic
alert messages from the RDP. Then a speciļ¬c parser converts the incoming key type to
the appropriate format according to the interface.
In order to consider the mutual trust between agents, each agent is associated to a
database of levels of trust towards its pairs. This means e.g. that the SAVP has a
dedicated level of trust for the ACE and the RDP. This database can be accessed by
Utopia [SBAG11], the MAS framework we use to control the assignment of responsibility
in an intelligent manner by taking the level of trust between agents into account. The
reaction alert architecture presented in this section is based on the ReD (Reaction after
Detection) project [FKA10]. The ReD project deļ¬nes and designs a solution to enhance the
detection/reaction process and improves the overall resilience of critical infrastructures.
Fig. 5 introduces the developed architecture illustrated with our clearing network alert
system. The ļ¬‚ow is supposed to begin with an alert detected by a probe (connected to
the SAVP at the bottom of the ļ¬gure).
This alert is sent to the ACE agent (customer layer) that does or does not conļ¬rm the
alert to the PIE. Afterwards, the PIE decides to adapt key or to forward the alert to an
ACE of a higher layer (acquiring/issuring). The PIE agent sends key policy to the RDP
agent, which decides which SAVP is able to transform the high level alert message into
an understandable format for the selected interface category. In order to manage access
rights, we have incorporated to ReD a Context Rights Management module (CRM). Block
on the right on Fig. 5. The CRM is in charge of providing access rights to agents (E.g.
SAVP to the probes and Logs File database, RDP to the keys Status database). The CRM
uses the rights and the crisis context database and is able to detect changes in the situation
thanks to Utopia functions. The ļ¬rst database includes the access rights corresponding
to the responsibilities and the second database includes a set of crisis contexts. Thanks
to these databases the CRM agent is able to provide adequate rights at operational layer
to an agent depending on the context.
3 Agent Responsibility Model
In a non-crisis context, agents are assigned to responsibilities like RDP, PIE, SAVP, etc.
Those assignments of responsibilities to agents require speciļ¬c access rights. By analyzing
for instance the activity of monitoring the bank Internet access (Fig. 5), we can e.g.
observe that the SAVPā€™s have the responsibility to collect the number of connection from
diļ¬€erent IP adresses (to prevent DoS attack) or the location of the connection, to make
a basic correlation between the values and the antecedent values records (stocked in the
Logs File database) and to report this analysis to the ACE in case of suspected alert. To
perform the monitoring activity, the SAVP are assigned to precise obligations and gain
corresponding access rights recorded in the access right database Those rights are e.g.:
access to the log ļ¬le or network ATM. When a crisis occurs, for instance if a DoS is detected
and isolates some SAVP agents from the rest of the network, the normal monitoring rules
and procedures do no longer work as usual and it is requested to change the responsibility
of the agents. In the above case, other agents have to assure the responsibilities of the
Submitted to SAR-SSI 2011 5
G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. GĆ¢teau, Z. Guessoum, D. Khadraoui
Fig. 5: Detailed reaction architecture for the clearing infrastructure
isolated SAVP. To assure their new responsibilities the agents request additional access
rights e.g. monitoring probes related to the isolated ATM.
In practice, the automatic assignment of rights to agents depending on their respon-
sibilities is not immediate and this contradicts the need to react promptly to the attack
or to the problem. To tackle the weakness, our approach is based on the reļ¬nement of
the agent responsibility and on the granting of access rights based on responsibility. The
right management module exploits two databases accessed by the CRM agent. The ļ¬rst
database includes the rights corresponding to the responsibilities and the second includes
a set of crisis contexts. Each crisis context deļ¬nes, depending on the type of crisis, which
agent is assigned to which responsibility.
The review of the literature highlights that the deļ¬nition of the agent responsibility is
mostly incomplete and that most of the architecture only considering the agent against
the outcome that he has to produce. Sometimes, advanced solutions integrate the inputs
that those agents request to perform the outcome. We deļ¬ne responsibility as a state
assigned to an agent to signify him its obligations concerning the task, its accountabilities
regarding its obligations, and the rights and capabilities necessary to perform it.
In order to integrate a dynamic re-assignment of the responsibility from one agent
working in normal conditions to one agent working in a crisis environment, we consider all
the concepts which compose the responsibility. In [FP09] we have proposed a responsibility
model that can be used to depict the agent responsibility. This model integrates the main
6 Submitted to SAR-SSI 2011
FCI: A MAS Trusted Architecture for Alert Detection and Authenticated Transaction
following concepts:
Obligation is a duty which links a responsibility with a task that must be performed.
Accountability is a duty to justify achievement, maintenance or avoidance of some
given state to an authority under the threat of sanction [Sta06]. Accountability contribute
to generate trust or to remove trust depending of the accountability outcomes.
Right encompasses facilities required by an agent to fulļ¬ll its obligations, e.g. the
access right that the agent gets once it is assigned responsible.
Capability describes the requisite qualities, skills or resources necessary to perform a
task. Capability may be declined through knowledge or know-how, possessed by the agent
such as ability to make a decision, its processing time, its faculty to analyze a problem,
and its position on the network.
Fig. 6: Agent responsibility model
Commitment pledged by the agent represents its engagement to fulļ¬ll a task and the
assurance that it does it in respect of good practices. The commitment in MAS has already
been subject to many researches as explained in [Sin08]. The semantic analyzes commit-
ment [SD09] and [MDHV02] advocates to consider the mutual trust between agents as
a pragmatic commitment antecedent [GBKD07]. The trust component signiļ¬es the lower
trust value that is necessary for an agent to be assigned responsible and is determined by
the importance of the obligation that is to be achieved.
Based on the agent responsibility model of Fig. 6, we deļ¬ne the responsibilities for
each agent of the architecture. Table 1 summarizes the SAVP and the ACE responsibilities
used in practice for the dynamic assignment (section 4). Due to the extent of this paper,
only the responsibility for two of them is presented: the SAVP and the ACE, and only
the 4 most signiļ¬cant components of the responsible are exploited: Obligations, Trust,
Capabilities and Rights.
For the SAVP, we observe that responsibility includes obligations such as the obligation
to retrieve logs from the component it monitors (ATM, IP network, shop VISA interface,
...), to provide an immediate reaction if necessary, to report the incident to the RDP, etc.
To perform this obligation, it needs the capabilities to be on the same network as the
component it controls and to communicate with the ACE and the facilitator agent. It also
must have the right to read log on the ATM or other interface category parameters on the
concerned network component and to write the values down in a central logs database.
Submitted to SAR-SSI 2011 7
G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. GĆ¢teau, Z. Guessoum, D. Khadraoui
Obligations Trust Capabilities Rights
SAVP
ā€¢ Retrieve the logs
from the component
it monitors;
ā€¢ Provide an immedi-
ate reaction if neces-
sary;
ā€¢ Communicate with
the facilitator to get
the address of the
other components
(ACE, CRM);
ā€¢ Report the incident
to the ACE.
0.8
ā€¢ SAVP must be on
the same network
as the parameter
(browser, ATM,
shop, etc.) it
monitors;
ā€¢ SAVP must be able
to communicate
with the ACE and
the facilitator agent.
Read parameter value
on the concerned net-
work component Write
parameter value in the
central logs database
ACE
ā€¢ Decide which keys
are appropriated to
be deployed by the
SAVP;
ā€¢ Conļ¬rm the alert to
the PIE;
ā€¢ Communicate with
the facilitator to get
the address of the
other components
(SAVP, CRM).
0.9
ā€¢ Fast bandwidth;
ā€¢ High CPU re-
sources;
ā€¢ Central position on
the network.
ā€¢ No speciļ¬c
right.
Tab. 1: Agents Responsibilities Speciļ¬cations
4 Responsibility to Agent Assignement
To assign responsibilities to agents, we have associated our architecture with Utopia an
insTitution Oriented ProgrammIng frAmework which aims at simplify agent based insti-
tutions programming. This architecture provides organizational speciļ¬cation for agents
institutions using MoiseInst
.
Fig. 7: MoiseInst
organization
8 Submitted to SAR-SSI 2011
FCI: A MAS Trusted Architecture for Alert Detection and Authenticated Transaction
MoiseInst
(Fig. 7.) is an Organization Speciļ¬cation (OS) system composed of four
dimensions:
ā€¢ Structural Speciļ¬cation (SS);
ā€¢ Functional Speciļ¬cation (FS);
ā€¢ Contextual Speciļ¬cation (CS);
ā€¢ Normative Speciļ¬cation (NS).
These speciļ¬cations are described in a XML ļ¬le and loaded by Utopia. From this
deļ¬ned organization, Utopia instantiates a framework allowing to specify responsibilities
and trust, and as consequence, to establish the agent responsible in terms of tasks, obli-
gations, rights and trust. In the following, we explain the Structural and the Functional
Speciļ¬cations which are related to the trust parameter. The paper [GBKD07] addresses
these speciļ¬cations in details.
The Structural Speciļ¬cation (Fig. 8) deļ¬nes (i) the responsibilities which agents are
assigned to in the Organization (ii) the relations between the responsibilities in terms
of data exchange during the execution of the tasks. E.g. <Link source=ā€SAVPā€ destina-
tion=ā€ACEā€/> speciļ¬es that the SAVP is allowed to send information to the ACE (iii)
the Groups of agents assigned to the same responsibility. E.g. <Responsibility id=ā€SAVPā€
min=ā€3ā€ max=ā€3ā€/> creates a SAVP group with a cardinality sets to 3. And (iv) the
initial level of trust of each agent. E.g. According to Fig. 8 the level of trust for the ACE
is set to 0.5 at boot. This value will change over the time based on acknowledgment and
task performance.
Fig. 8: Structural Speciļ¬cation schema
In case of a crisis, if a SAVP from a SAVP group is corrupted, the responsibility of
that failing agent is transferred to new agents from the same group.
The Functional Speciļ¬cation (FS) on Fig. 9 deļ¬nes global business processes that can
be executed by the diļ¬€erent agents participating to the Organization according to their
responsibilities and Groups.
Submitted to SAR-SSI 2011 9
G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. GĆ¢teau, Z. Guessoum, D. Khadraoui
Fig. 9: Functional Speciļ¬cation schema
5 Trust and reputation management
The trust and reputation model (TRM) evaluates the responsability fulļ¬llment of each
component involved in the architecture. A large review of computational trust models can
be found in [SS05] and more details for cognitive aspects of trust is presented in [CF98].
The proposed reputation-based trust management scheme is used to predict the future
behavior of a component in order to establish trust among agents and hence to improve
security in the system. The way trust information is quantiļ¬ed depends on the applica-
tion ļ¬eld. Some authors used probabilistic approaches [VMC10] [PTJL05] [MMA+
01] to
quantify trust. This approach is used in several ļ¬elds such as Mobile Ad-hoc Networks,
Social Networks or e-commerce. Other approaches such as Fuzzy approaches or Bayesian
networks [BB04][BB02][TPJL06] are also exploited to quantify trust with some diļ¬€erences,
if a ageing factor is used or not, the way reputation parameters are aggregated. The infor-
mation needed to evaluate the trustworthiness of a component is provided by the SAVPā€™s
probe.
Fig. 10: Reputation Repartion Schema
As mentioned in the agent responsibility speciļ¬cations, if one of the SAVPā€™s agents
is not trustworthy because for instance it has been corrupted, it has to be removed and
10 Submitted to SAR-SSI 2011
FCI: A MAS Trusted Architecture for Alert Detection and Authenticated Transaction
replaced. The assignment of a new responsibility to another SAVP (SAVP1 or SAVP2 in
Fig. 10) is done based on the trust value of that agent.
5.1 Computing trust and reputation
The trust (T) and reputation (R) of each component is provided by trust assessment
regarding an SAVP agent based on direct information collected by the SAVP agents himself
and by second hand-information coming from other ACE to which it belongs. This trust
based reputation is calculated at time t as follows:
TACE1āˆ’SAV P 2 = RACE1āˆ’SAV P 2 = DRACE1āˆ’SAV P 2 (1)
Where DRACE1āˆ’SAV P 2 is the reputation derived from the direct reputation of SAVP2
in the view of ACE1. The scenario depicted in Fig. 10 shows that ACE1 has no direct
connectivity with SAVP2 and has to rely on information coming from ACE2. In this case
(1) leads to (2):
TACE1āˆ’SAV P 2 = RACE1āˆ’SAV P 2 = DRACE1āˆ’SAV P 2 + Ī» āˆ— IRACE1āˆ’SAV P 2 (2)
Where Ī» is the weighted factor associated to the reputation value and IRACE1āˆ’SAV P 2
is the indirect reputation value provided by other agents about agent SAVP2. In the
followings we presented how the direct reputation (DR) and the indirect reputation (IR)
are calculated. The direct reputation is deļ¬ned as the probability evaluated by ACE1
that ACE2 will achieve his goal at the next solicitation. Several approaches can be used
to deal with reputation information such as Beta, Gaussian, Poisson, binomial. [BB02]
prooves that the Beta distribution system is the most promising due to its ļ¬‚exibility and
simplicity as well as its strong foundation on the theory of statistics.
Our model used the Beta probability density function Beta(Ī±, Ī²) as shown in equation
(3) to represent direct reputation.
p(Īø) = Beta(Ī±, Ī²) =
Ī“(Ī± + Ī²)
Ī“(Ī±)Ī“(Ī²)
ĪøĪ±āˆ’1
ĪøĪ²āˆ’1
(3)
Where Īø represents the probability that the next event will occur. This Beta function
is indexed with two parameters Ī± and Ī², which represent the sum of positive and negative
assessment, respectively that ACE1 has for ACE2. We consider that ACE1 rates ACE2
during an assessment in a binary scale (positive (1), negative (0)). The direct reputation
value is the mean of the Beta distribution between ACE1 and ACE2. Reputation value
for agent ACE2 about agent ACE1 is calculated as the expectation value of Beta(Ī±, Ī²)
with E equal the standard deviation :
RACE1āˆ’ACE2 = E(Beta(Ī±, Ī²)) (4)
An agent ACE1 is trusted by agent ACE2 if and only if RACE1āˆ’ACE2 ā‰¤ Ļ„ where Ļ„ is a
threshold value from which the agent is considered trustworthy. This threshold is deļ¬ned
by the responsibilities speciļ¬cations. For instance, the trust threshold for SAVP agents is
set to 0.8. Initially, Ī± = Ī² = 0, which corresponds to uniform distribution and indicates
absence of knowledge.
Submitted to SAR-SSI 2011 11
G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. GĆ¢teau, Z. Guessoum, D. Khadraoui
RACE1āˆ’ACE2 = E(Beta(Ī±, Ī²)) =
Ī± + 1
Ī± + Ī² + 2
(5)
The update of this reputation value is done with respect to the Beta function. This
trust represents the trustworthiness of one agent to another. In order to highlight the
impact of recent behavior, the ageing factor is introduced. We assume that this ageing
factor g depends on the context. This value is update in (6) as follows:
Ī±new
ACE1āˆ’ACE2 = g āˆ— Ī±ACE1āˆ’ACE2 and Ī²new
ACE1āˆ’ACE2 = g āˆ— Ī²ACE1āˆ’ACE2 (6)
A small value of g gives more weight to recent trust values. However choosing the
right value of g is not straightforward. For this purpose, we assume that the value of g
is chosen by a Human at the initialization of the system. Unlike the components weights
which represents the personal view that an agent has to another.
Our solution for setting components weights is based on the similarity beliefs between
two agents. This similarity is based on the assumption that if two agents rate a third agent
in the same way, this means that they have similar beliefs and views of this agent. Given
two agents ACE1 and ACE2, let the set (ACE1, ACE2) be the set of all mutual agents,
that both ACE1 and ACE2 have interacted with and hence have a direct reputation with
those agents in (7) as follows:
Set(ACE1, ACE2) = {c, d, e, ..., n} (7)
The similarity belief (Ī›) between those two agents is given in (8).
Ī› = Sim(ACE1, ACE2) = 1 āˆ’ Dis(ACE1, ACE2) (8)
Where the distance function between 2 agents ACE1, ACE2 is calculated in (9) based
on the Euclidian method.
Dis(ACE1, ACE2) =
iāˆˆSet(ACE1,ACE2)
(RACE1āˆ’ACEi āˆ’ RACE2āˆ’ACEi)2 (9)
By doing that, an agent can have no common direct history with another and in the
same time have a trustworthy (or not) view of that agent.
Agents ACE1 ACE2 Ī» CRM CRM
SAVP1 unknown 0.6 unknown 0.8
SAVP2 unknown 0.8 unknown 0.9
SAVP3 unknown 0.1 unknown 0.16
ACE1 0.8 0.6 0.8
ACE2 0.9 0.7 0.7
Tab. 2: Example of Reputation Calculation
12 Submitted to SAR-SSI 2011
FCI: A MAS Trusted Architecture for Alert Detection and Authenticated Transaction
Table 2 represents the reputation value that the agents have for each other based on
their common past interaction history. The grey boxes represent the reputation that agent
has about itself. This is not possible since we assume that reputation is not reļ¬‚exive. The
unknown value means that Utopia has no common history with that agent.
5.2 Example of responsibility assignments based on reputation.
In a normal situation one agent is assigned to a SAVP responsibility, each agent is asso-
ciated to one or more probes (ATM, IP network,...) and reports to the ACE. Each time
a SAVP agent wants to access a component of the network, it previously needs to contact
the CRM that consults the access rights database in order to retrieve the rights associated
to the responsibility assigned to the agent.
Based on the values of the Table 2, CRM allows to transfer the responsibilities of the
corrupted agent.
During an abnormal situation, the context evolves and an appropriate crisis context
should be selected. Each context is adapted to a speciļ¬c case. In this use case, the
crisis concerns the corruption of the SAVP3 agent and calls for a transfer of that agent
responsibility from the corrupted agent to another agent from the same group. That
transfer of responsibility implies, in the mean time, a transfer of access rights.
The diagram of activities, as highlighted by white numbers in black circles on Fig. 5,
is the following:
1. Under a threshold of 0.5, CRM considers that an agent is no longer trustworthy.
According to Table 2, the trust level of the SAVP3 is set to 0.16. Consequently the
CRM adapts and sends the new crisis context to Utopia. Based on that context,
the CRM is able to update the access rights data base;
2. Afterwards, the SAVP3 loses its access rights and is isolated, and the responsibilities
of SAVP3 are transferred to the SAVP2 which has a reputation of 0.9;
3. The agent SAVP2 that receive the additional SAVP3 responsibilities requests the
access rights corresponding to that responsibility to the CRM.
6 Conclusions
Critical infrastructures are more and more present and needs to be seriously managed and
monitored regarding the increasing amount of threats. This paper presents a solution for
bank clearing security using a MAS based architecture. The system, initially developed
based on static assignments of responsibilities to agents, has needs for more dynamism
in order to keep aligned to the new arising risks. This paper ļ¬rstly addresses the new
challenge by providing a framework for dynamically assigning responsibilities to agents
depending on the crisis context. That contextualized responsibility assignment permits,
in ļ¬ne, to manage the agent access rights to critical information. Secondly, the paper
enhances that dynamic assignment taking into account the trust and reputation between
the agents during the assignment mechanism.
The architecture we exploit to demonstrate the enhanced reaction mechanism, relies
on the two main pillars ReD and Utopia, which are being tested and currently produced
in our labs. Practically ReD deļ¬nes the structural bases for the clearing mechanism and
Submitted to SAR-SSI 2011 13
G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. GĆ¢teau, Z. Guessoum, D. Khadraoui
Utopia permits to deploy the responsibilities to agents. The paper is illustrated based on
a use case that shows how the transfer of rights for a corrupted SAVP is performed during
an evolution from normal to crisis situation.
Acknowledgment
This research was funded by the National Research Fund of Luxembourg in the context of
TITAN (Trust-Assurance for Critical Infrastructures in Multi-Agents Environments, FNR
CO/08/IS/21) project.
References
[Act02] S.O. Act. Sarbanes-Oxley Act. In United States of America 107th congress, US
Congress (2002) Available from:(http://www. sec. gov/about/laws/soa2002.
pdf), 2002.
[Bas06] II Basel. International convergence of capital measurement and capital stan-
dards. A revised framework, 2006.
[BB02] S. Buchegger and J.-Y. Le Boudec. The Beta Reputation System. 15th Bled
Conference on Electronic Commerce, Bled, Slovenia, 17-19 June 2002, 2002.
[BB04] S. Buchegger and J.-Y. Le Boudec. A Robust Reputation System for Peer-
to-Peer and Mobile Ad-hoc Networks. P2PEcon 2004, Cambridge, MA, 4-5
June, 2004.
[BWIM09] S. Baker, S. Waterman, G. Ivanov, and Inc McAfee. In the Crossļ¬re: Critical
Infrastructure in the Age of Cyber War. McAfee, Inc., 2009.
[CF98] C. Castelfranchi and R. Falcone. Principles of trust for mas: Cognitive
anatomy, social importance, and quantiļ¬cation. In Yves Demazeau, editor,
ICMAS, pages 72ā€“79. IEEE Computer Society, 1998.
[FKA10] C. Feltus, D. Khadraoui, and J. Aubert. A Security Decision-Reaction Ar-
chitecture for Heterogeneous Distributed Network. In Availability, Reliability,
and Security, 2010. ARESā€™10 International Conference on, pages 1ā€“8. IEEE,
2010.
[FP09] C. Feltus and M. Petit. Building a Responsibility Model Including Account-
ability, Capability and Commitment. In Availability, Reliability and Security,
2009. ARESā€™09. International Conference on, pages 412ā€“419. IEEE, 2009.
[GBKD07] B. GĆ¢teau, O. Boissier, D. Khadraoui, and E. Dubois. Controlling an in-
teractive game with a multi-agent based normative organizational model. In
J. VƔzquez-Salceda, G. Boella, O. Boissier, and E. Matson, editors, Post-
Proceedings of the Workshop COIN at the 17th ECAI conference, LNCS 4386,
pages 86ā€“100. Springer-Verlag, 2007. ISBN: 978-3-540-74457-3.
[MDHV02] J.B. Mehdi, M. Dastani, Z. Huang, and L. Van Der Torre. Trust and Com-
mitment in Dynamic Logic. In In Procs. of EurAsia ICT 2002, LNCS 2510.
Citeseer, 2002.
14 Submitted to SAR-SSI 2011
FCI: A MAS Trusted Architecture for Alert Detection and Authenticated Transaction
[MMA+
01] Lik Mui, Mojdeh Mohtashemi, Cheewee Ang, Peter Szolovits, and Ari Hal-
berstadt. Ratings in Distributed Systems: A Bayesian Approach, 2001.
[PTJL05] J. Patel, W. T. Luke Teacy, N. R. Jennings, and M. Luck. A probabilistic
trust model for handling inaccurate reputation sources. In Peter Herrmann,
ValƩrie Issarny, and Simon Shiu, editors, iTrust, volume 3477 of Lecture Notes
in Computer Science, pages 193ā€“209. Springer, 2005.
[Rin04] S.M. Rinaldi. Modeling and simulating critical infrastructures and their in-
terdependencies. 2004.
[SBAG11] P. Schmitt, C. Bonhomme, J. Aubert, and B. GĆ¢teau. Programming Elec-
tronic Institutions with Utopia. In W. Aalst, J. Mylopoulos, N. M. Sadeh,
M. J. Shaw, C. Szyperski, P. Soļ¬€er, and E. Proper, editors, Information Sys-
tems Evolution, volume 72 of Lecture Notes in Business Information Process-
ing, pages 122ā€“135. Springer Berlin Heidelberg, 2011.
[SD09] M.J. Smith and M. Desjardins. Learning to trust in the competence and com-
mitment of agents. Autonomous Agents and Multi-Agent Systems, 18(1):36ā€“
82, 2009.
[Sin08] M.P. Singh. Semantical considerations on dialectical and practical com-
mitments. In Proceedings of the 23rd Conference on Artiļ¬cial Intelligence
(AAAI), pages 176ā€“181, 2008.
[SS05] J. Sabater and C. Sierra. Review on computational trust and reputation
models. Artiļ¬cial Intelligence Review, 24(1):33ā€“60, September 2005.
[Sta06] B. Stahl. Accountability and Reļ¬‚ective Responsibility in Information Systems.
The Information Society: Emerging Landscapes, pages 51ā€“68, 2006.
[TPJL06] W. T. Luke Teacy, J. Patel, N. R. Jennings, and M. Luck. Travos: Trust
and reputation in the context of inaccurate information sources. Autonomous
Agents and Multi-Agent Systems, 12(2):183ā€“198, 2006.
[VMC10] G. Vogiatzis, I. MacGillivray, and M. Chli. A probabilistic model for trust and
reputation. In Proceedings of the 9th International Conference on Autonomous
Agents and Multiagent Systems: volume 1-Volume 1, pages 225ā€“232. Interna-
tional Foundation for Autonomous Agents and Multiagent Systems, 2010.
Submitted to SAR-SSI 2011 15

More Related Content

What's hot

NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information Systemnewbie2019
Ā 
IEEE-S&P Magazine-2015-Massacci
IEEE-S&P Magazine-2015-MassacciIEEE-S&P Magazine-2015-Massacci
IEEE-S&P Magazine-2015-MassacciFabio Massacci
Ā 
Trusted computing: an overview
Trusted computing: an overviewTrusted computing: an overview
Trusted computing: an overviewTJR Global
Ā 
Configuration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability ManagementConfiguration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability ManagementChris Furton
Ā 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
Ā 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringaizazhussain234
Ā 
J018127176.publishing paper of mamatha (1)
J018127176.publishing paper of mamatha (1)J018127176.publishing paper of mamatha (1)
J018127176.publishing paper of mamatha (1)IOSR Journals
Ā 
Iet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th DecemberIet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th DecemberFrancis_McKinney
Ā 
Authentication Utilizing Prior Routing for Versatile Network
Authentication Utilizing Prior Routing for Versatile NetworkAuthentication Utilizing Prior Routing for Versatile Network
Authentication Utilizing Prior Routing for Versatile Networkijtsrd
Ā 
Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)Ian Sommerville
Ā 
Eco secu infocom
Eco secu infocomEco secu infocom
Eco secu infocom92pawansingh
Ā 
Assessing Risk: Developing a Client/Server Security Architecture,
 Assessing Risk: Developing a Client/Server Security Architecture,  Assessing Risk: Developing a Client/Server Security Architecture,
Assessing Risk: Developing a Client/Server Security Architecture, MITDaveMillaar
Ā 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET Journal
Ā 
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...IJTET Journal
Ā 

What's hot (18)

Octav ethreat profiles
Octav ethreat profilesOctav ethreat profiles
Octav ethreat profiles
Ā 
Conceptual trusted incident reaction architecture
Conceptual trusted incident reaction architectureConceptual trusted incident reaction architecture
Conceptual trusted incident reaction architecture
Ā 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
Ā 
IEEE-S&P Magazine-2015-Massacci
IEEE-S&P Magazine-2015-MassacciIEEE-S&P Magazine-2015-Massacci
IEEE-S&P Magazine-2015-Massacci
Ā 
Trusted computing: an overview
Trusted computing: an overviewTrusted computing: an overview
Trusted computing: an overview
Ā 
Configuration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability ManagementConfiguration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability Management
Ā 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
Ā 
Security engineering
Security engineeringSecurity engineering
Security engineering
Ā 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
Ā 
J018127176.publishing paper of mamatha (1)
J018127176.publishing paper of mamatha (1)J018127176.publishing paper of mamatha (1)
J018127176.publishing paper of mamatha (1)
Ā 
Iet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th DecemberIet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th December
Ā 
Authentication Utilizing Prior Routing for Versatile Network
Authentication Utilizing Prior Routing for Versatile NetworkAuthentication Utilizing Prior Routing for Versatile Network
Authentication Utilizing Prior Routing for Versatile Network
Ā 
Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)
Ā 
Eco secu infocom
Eco secu infocomEco secu infocom
Eco secu infocom
Ā 
Assessing Risk: Developing a Client/Server Security Architecture,
 Assessing Risk: Developing a Client/Server Security Architecture,  Assessing Risk: Developing a Client/Server Security Architecture,
Assessing Risk: Developing a Client/Server Security Architecture,
Ā 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
Ā 
Outsourcing
OutsourcingOutsourcing
Outsourcing
Ā 
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Adaptive Circumstance Knowledgeable Trusted System for Security Enhancement i...
Ā 

Viewers also liked

Improving operational risk management systems by formalizing the basel ii reg...
Improving operational risk management systems by formalizing the basel ii reg...Improving operational risk management systems by formalizing the basel ii reg...
Improving operational risk management systems by formalizing the basel ii reg...Luxembourg Institute of Science and Technology
Ā 
L G N Opportunity P P T
L G N  Opportunity  P P TL G N  Opportunity  P P T
L G N Opportunity P P TRenato Miraballes
Ā 
VER EL MUNDO CON HUMOR
VER EL MUNDO CON HUMORVER EL MUNDO CON HUMOR
VER EL MUNDO CON HUMORprocesosdevida
Ā 
Brand protection business case
Brand protection business caseBrand protection business case
Brand protection business caseNEW Momentum
Ā 
El Nuevo Internet Explorer 9
El Nuevo Internet Explorer 9El Nuevo Internet Explorer 9
El Nuevo Internet Explorer 9Eventos Creativos
Ā 
Defensa Centralizada contra amenazas multi-vector - ConfiguraciĆ³n de un centr...
Defensa Centralizada contra amenazas multi-vector - ConfiguraciĆ³n de un centr...Defensa Centralizada contra amenazas multi-vector - ConfiguraciĆ³n de un centr...
Defensa Centralizada contra amenazas multi-vector - ConfiguraciĆ³n de un centr...Eventos Creativos
Ā 
Belles d -antan__r_b
Belles d -antan__r_bBelles d -antan__r_b
Belles d -antan__r_bPatricia GALLET
Ā 
SchĆ¼ler suchen Freunde
SchĆ¼ler suchen FreundeSchĆ¼ler suchen Freunde
SchĆ¼ler suchen Freundedeutschonline
Ā 
MŠ¾Ń‘ тŠµŠ»Š¾ Šø ухŠ¾Š“ Š·Š° тŠµŠ»Š¾Š¼
MŠ¾Ń‘ тŠµŠ»Š¾ Šø ухŠ¾Š“ Š·Š° тŠµŠ»Š¾Š¼MŠ¾Ń‘ тŠµŠ»Š¾ Šø ухŠ¾Š“ Š·Š° тŠµŠ»Š¾Š¼
MŠ¾Ń‘ тŠµŠ»Š¾ Šø ухŠ¾Š“ Š·Š° тŠµŠ»Š¾Š¼deutschonline
Ā 
Mein computer russisch
Mein computer russischMein computer russisch
Mein computer russischdeutschonline
Ā 
Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...Luxembourg Institute of Science and Technology
Ā 
Brand Protection
Brand Protection Brand Protection
Brand Protection NEW Momentum
Ā 
Patron perceived as difficult
Patron perceived as difficultPatron perceived as difficult
Patron perceived as difficultflorencye
Ā 
Videokonferenz Gera Orenburg
Videokonferenz Gera Orenburg Videokonferenz Gera Orenburg
Videokonferenz Gera Orenburg deutschonline
Ā 
Video summaries
Video summariesVideo summaries
Video summariesellysawicky
Ā 
Visuals from the trek
Visuals from the trekVisuals from the trek
Visuals from the treksabusingh
Ā 
Do you like fashion slideshow
Do you like fashion slideshowDo you like fashion slideshow
Do you like fashion slideshowLawrence J Parsley
Ā 

Viewers also liked (20)

Improving operational risk management systems by formalizing the basel ii reg...
Improving operational risk management systems by formalizing the basel ii reg...Improving operational risk management systems by formalizing the basel ii reg...
Improving operational risk management systems by formalizing the basel ii reg...
Ā 
L G N Opportunity P P T
L G N  Opportunity  P P TL G N  Opportunity  P P T
L G N Opportunity P P T
Ā 
VER EL MUNDO CON HUMOR
VER EL MUNDO CON HUMORVER EL MUNDO CON HUMOR
VER EL MUNDO CON HUMOR
Ā 
Brand protection business case
Brand protection business caseBrand protection business case
Brand protection business case
Ā 
Pause
PausePause
Pause
Ā 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
Ā 
El Nuevo Internet Explorer 9
El Nuevo Internet Explorer 9El Nuevo Internet Explorer 9
El Nuevo Internet Explorer 9
Ā 
Responsibility aspects in service engineering for e government
Responsibility aspects in service engineering for e governmentResponsibility aspects in service engineering for e government
Responsibility aspects in service engineering for e government
Ā 
Defensa Centralizada contra amenazas multi-vector - ConfiguraciĆ³n de un centr...
Defensa Centralizada contra amenazas multi-vector - ConfiguraciĆ³n de un centr...Defensa Centralizada contra amenazas multi-vector - ConfiguraciĆ³n de un centr...
Defensa Centralizada contra amenazas multi-vector - ConfiguraciĆ³n de un centr...
Ā 
Belles d -antan__r_b
Belles d -antan__r_bBelles d -antan__r_b
Belles d -antan__r_b
Ā 
SchĆ¼ler suchen Freunde
SchĆ¼ler suchen FreundeSchĆ¼ler suchen Freunde
SchĆ¼ler suchen Freunde
Ā 
MŠ¾Ń‘ тŠµŠ»Š¾ Šø ухŠ¾Š“ Š·Š° тŠµŠ»Š¾Š¼
MŠ¾Ń‘ тŠµŠ»Š¾ Šø ухŠ¾Š“ Š·Š° тŠµŠ»Š¾Š¼MŠ¾Ń‘ тŠµŠ»Š¾ Šø ухŠ¾Š“ Š·Š° тŠµŠ»Š¾Š¼
MŠ¾Ń‘ тŠµŠ»Š¾ Šø ухŠ¾Š“ Š·Š° тŠµŠ»Š¾Š¼
Ā 
Mein computer russisch
Mein computer russischMein computer russisch
Mein computer russisch
Ā 
Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...
Ā 
Brand Protection
Brand Protection Brand Protection
Brand Protection
Ā 
Patron perceived as difficult
Patron perceived as difficultPatron perceived as difficult
Patron perceived as difficult
Ā 
Videokonferenz Gera Orenburg
Videokonferenz Gera Orenburg Videokonferenz Gera Orenburg
Videokonferenz Gera Orenburg
Ā 
Video summaries
Video summariesVideo summaries
Video summaries
Ā 
Visuals from the trek
Visuals from the trekVisuals from the trek
Visuals from the trek
Ā 
Do you like fashion slideshow
Do you like fashion slideshowDo you like fashion slideshow
Do you like fashion slideshow
Ā 

Similar to Financial critical infrastructure a mas trusted architecture for alert detection and authenticated transactions

Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionchristophefeltus
Ā 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...Luxembourg Institute of Science and Technology
Ā 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...christophefeltus
Ā 
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemDynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemRadita Apriana
Ā 
future internetArticleERMOCTAVE A Risk Management Fra.docx
future internetArticleERMOCTAVE A Risk Management Fra.docxfuture internetArticleERMOCTAVE A Risk Management Fra.docx
future internetArticleERMOCTAVE A Risk Management Fra.docxgilbertkpeters11344
Ā 
future internetArticleERMOCTAVE A Risk Management Fra
future internetArticleERMOCTAVE A Risk Management Frafuture internetArticleERMOCTAVE A Risk Management Fra
future internetArticleERMOCTAVE A Risk Management FraDustiBuckner14
Ā 
Future internet articleermoctave a risk management fra
Future internet articleermoctave a risk management fraFuture internet articleermoctave a risk management fra
Future internet articleermoctave a risk management fraarnit1
Ā 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkchristophefeltus
Ā 
Conceptual trusted incident reaction architecture
Conceptual trusted incident reaction architectureConceptual trusted incident reaction architecture
Conceptual trusted incident reaction architecturechristophefeltus
Ā 
MSc (Computer Science) - Academic Proposal, May 2009 - Shaon Diwakar
MSc (Computer Science) - Academic Proposal, May 2009 - Shaon DiwakarMSc (Computer Science) - Academic Proposal, May 2009 - Shaon Diwakar
MSc (Computer Science) - Academic Proposal, May 2009 - Shaon DiwakarNewsMaven
Ā 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesA Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesIJERA Editor
Ā 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques IJERA Editor
Ā 
Include at least 250 words in your posting andĀ at least 250 words in
Include at least 250 words in your posting andĀ at least 250 words inInclude at least 250 words in your posting andĀ at least 250 words in
Include at least 250 words in your posting andĀ at least 250 words inmaribethy2y
Ā 
Monitoring your organization against threats - Critical System Control
Monitoring your organization against threats - Critical System ControlMonitoring your organization against threats - Critical System Control
Monitoring your organization against threats - Critical System ControlMarc-Andre Heroux
Ā 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsIJEACS
Ā 
A predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsA predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsIJCNCJournal
Ā 
A risk and security assessment of VANET availability using attack tree concept
A risk and security assessment of VANET availability using attack tree concept A risk and security assessment of VANET availability using attack tree concept
A risk and security assessment of VANET availability using attack tree concept IJECEIAES
Ā 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
Ā 
Irjet v7 i3475
Irjet v7 i3475Irjet v7 i3475
Irjet v7 i3475aissmsblogs
Ā 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1nicfs
Ā 

Similar to Financial critical infrastructure a mas trusted architecture for alert detection and authenticated transactions (20)

Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
Ā 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...
Ā 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...
Ā 
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemDynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Ā 
future internetArticleERMOCTAVE A Risk Management Fra.docx
future internetArticleERMOCTAVE A Risk Management Fra.docxfuture internetArticleERMOCTAVE A Risk Management Fra.docx
future internetArticleERMOCTAVE A Risk Management Fra.docx
Ā 
future internetArticleERMOCTAVE A Risk Management Fra
future internetArticleERMOCTAVE A Risk Management Frafuture internetArticleERMOCTAVE A Risk Management Fra
future internetArticleERMOCTAVE A Risk Management Fra
Ā 
Future internet articleermoctave a risk management fra
Future internet articleermoctave a risk management fraFuture internet articleermoctave a risk management fra
Future internet articleermoctave a risk management fra
Ā 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
Ā 
Conceptual trusted incident reaction architecture
Conceptual trusted incident reaction architectureConceptual trusted incident reaction architecture
Conceptual trusted incident reaction architecture
Ā 
MSc (Computer Science) - Academic Proposal, May 2009 - Shaon Diwakar
MSc (Computer Science) - Academic Proposal, May 2009 - Shaon DiwakarMSc (Computer Science) - Academic Proposal, May 2009 - Shaon Diwakar
MSc (Computer Science) - Academic Proposal, May 2009 - Shaon Diwakar
Ā 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesA Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
Ā 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
Ā 
Include at least 250 words in your posting andĀ at least 250 words in
Include at least 250 words in your posting andĀ at least 250 words inInclude at least 250 words in your posting andĀ at least 250 words in
Include at least 250 words in your posting andĀ at least 250 words in
Ā 
Monitoring your organization against threats - Critical System Control
Monitoring your organization against threats - Critical System ControlMonitoring your organization against threats - Critical System Control
Monitoring your organization against threats - Critical System Control
Ā 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control Systems
Ā 
A predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsA predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphs
Ā 
A risk and security assessment of VANET availability using attack tree concept
A risk and security assessment of VANET availability using attack tree concept A risk and security assessment of VANET availability using attack tree concept
A risk and security assessment of VANET availability using attack tree concept
Ā 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
Ā 
Irjet v7 i3475
Irjet v7 i3475Irjet v7 i3475
Irjet v7 i3475
Ā 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
Ā 

More from Luxembourg Institute of Science and Technology

Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Luxembourg Institute of Science and Technology
Ā 
Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...Luxembourg Institute of Science and Technology
Ā 
Who govern my responsibilities sim a methodology to align business and it pol...
Who govern my responsibilities sim a methodology to align business and it pol...Who govern my responsibilities sim a methodology to align business and it pol...
Who govern my responsibilities sim a methodology to align business and it pol...Luxembourg Institute of Science and Technology
Ā 
Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...Luxembourg Institute of Science and Technology
Ā 
Solution standard de compensation appliquƩe Ơ une architecture e business sƩc...
Solution standard de compensation appliquƩe Ơ une architecture e business sƩc...Solution standard de compensation appliquƩe Ơ une architecture e business sƩc...
Solution standard de compensation appliquƩe Ơ une architecture e business sƩc...Luxembourg Institute of Science and Technology
Ā 
Strengthening employeeā€™s responsibility to enhance governance of it ā€“ cobit r...
Strengthening employeeā€™s responsibility to enhance governance of it ā€“ cobit r...Strengthening employeeā€™s responsibility to enhance governance of it ā€“ cobit r...
Strengthening employeeā€™s responsibility to enhance governance of it ā€“ cobit r...Luxembourg Institute of Science and Technology
Ā 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementLuxembourg Institute of Science and Technology
Ā 
Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...Luxembourg Institute of Science and Technology
Ā 
Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...Luxembourg Institute of Science and Technology
Ā 
Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...Luxembourg Institute of Science and Technology
Ā 
On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...Luxembourg Institute of Science and Technology
Ā 
Noemi, a collaborative management for ict process improvement in sme experien...
Noemi, a collaborative management for ict process improvement in sme experien...Noemi, a collaborative management for ict process improvement in sme experien...
Noemi, a collaborative management for ict process improvement in sme experien...Luxembourg Institute of Science and Technology
Ā 

More from Luxembourg Institute of Science and Technology (20)

Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Smart-X: an Adaptive Multi-Agent Platform for Smart-TopicsSmart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics
Ā 
Joint workshop on security modeling archimate forum and security forum
Joint workshop on security modeling archimate forum and security forumJoint workshop on security modeling archimate forum and security forum
Joint workshop on security modeling archimate forum and security forum
Ā 
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Ā 
Modeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate languageModeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate language
Ā 
Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...Aligning access rights to governance needs with the responsibility meta model...
Aligning access rights to governance needs with the responsibility meta model...
Ā 
Who govern my responsibilities sim a methodology to align business and it pol...
Who govern my responsibilities sim a methodology to align business and it pol...Who govern my responsibilities sim a methodology to align business and it pol...
Who govern my responsibilities sim a methodology to align business and it pol...
Ā 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
Ā 
Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...
Ā 
Solution standard de compensation appliquƩe Ơ une architecture e business sƩc...
Solution standard de compensation appliquƩe Ơ une architecture e business sƩc...Solution standard de compensation appliquƩe Ơ une architecture e business sƩc...
Solution standard de compensation appliquƩe Ơ une architecture e business sƩc...
Ā 
Strengthening employeeā€™s responsibility to enhance governance of it ā€“ cobit r...
Strengthening employeeā€™s responsibility to enhance governance of it ā€“ cobit r...Strengthening employeeā€™s responsibility to enhance governance of it ā€“ cobit r...
Strengthening employeeā€™s responsibility to enhance governance of it ā€“ cobit r...
Ā 
Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
Ā 
Service specification and service compliance how to consider the responsibil...
Service specification and service compliance  how to consider the responsibil...Service specification and service compliance  how to consider the responsibil...
Service specification and service compliance how to consider the responsibil...
Ā 
Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...Reputation based dynamic responsibility to agent assignement for critical inf...
Reputation based dynamic responsibility to agent assignement for critical inf...
Ā 
Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...Remola responsibility model language to align access rights with business pro...
Remola responsibility model language to align access rights with business pro...
Ā 
Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...
Ā 
Preliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methodsPreliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methods
Ā 
Organizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructureOrganizational security architecture for critical infrastructure
Organizational security architecture for critical infrastructure
Ā 
Open sst based clearing mechanism for e business
Open sst based clearing mechanism for e businessOpen sst based clearing mechanism for e business
Open sst based clearing mechanism for e business
Ā 
On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...On designing automatic reaction strategy for critical infrastructure scada sy...
On designing automatic reaction strategy for critical infrastructure scada sy...
Ā 
Noemi, a collaborative management for ict process improvement in sme experien...
Noemi, a collaborative management for ict process improvement in sme experien...Noemi, a collaborative management for ict process improvement in sme experien...
Noemi, a collaborative management for ict process improvement in sme experien...
Ā 

Recently uploaded

SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
Ā 
Call Girls in Mayapuri Delhi šŸ’ÆCall Us šŸ”9953322196šŸ” šŸ’ÆEscort.
Call Girls in Mayapuri Delhi šŸ’ÆCall Us šŸ”9953322196šŸ” šŸ’ÆEscort.Call Girls in Mayapuri Delhi šŸ’ÆCall Us šŸ”9953322196šŸ” šŸ’ÆEscort.
Call Girls in Mayapuri Delhi šŸ’ÆCall Us šŸ”9953322196šŸ” šŸ’ÆEscort.aasikanpl
Ā 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptArshadWarsi13
Ā 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
Ā 
insect anatomy and insect body wall and their physiology
insect anatomy and insect body wall and their  physiologyinsect anatomy and insect body wall and their  physiology
insect anatomy and insect body wall and their physiologyDrAnita Sharma
Ā 
Call Girls in Munirka Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Munirka Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls in Munirka Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Munirka Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
ā€ā€VIRUS - 123455555555555555555555555555555555555555
ā€ā€VIRUS -  123455555555555555555555555555555555555555ā€ā€VIRUS -  123455555555555555555555555555555555555555
ā€ā€VIRUS - 123455555555555555555555555555555555555555kikilily0909
Ā 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxpriyankatabhane
Ā 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaPraksha3
Ā 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzohaibmir069
Ā 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
Ā 
Call Us ā‰½ 9953322196 ā‰¼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ā‰½ 9953322196 ā‰¼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ā‰½ 9953322196 ā‰¼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ā‰½ 9953322196 ā‰¼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
Ā 
Welcome to GFDL for Take Your Child To Work Day
Welcome to GFDL for Take Your Child To Work DayWelcome to GFDL for Take Your Child To Work Day
Welcome to GFDL for Take Your Child To Work DayZachary Labe
Ā 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
Ā 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
Ā 
Call Girls in Aiims Metro Delhi šŸ’ÆCall Us šŸ”9953322196šŸ” šŸ’ÆEscort.
Call Girls in Aiims Metro Delhi šŸ’ÆCall Us šŸ”9953322196šŸ” šŸ’ÆEscort.Call Girls in Aiims Metro Delhi šŸ’ÆCall Us šŸ”9953322196šŸ” šŸ’ÆEscort.
Call Girls in Aiims Metro Delhi šŸ’ÆCall Us šŸ”9953322196šŸ” šŸ’ÆEscort.aasikanpl
Ā 
Solution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsSolution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsHajira Mahmood
Ā 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantadityabhardwaj282
Ā 
Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)DHURKADEVIBASKAR
Ā 
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxTwin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxEran Akiva Sinbar
Ā 

Recently uploaded (20)

SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
Ā 
Call Girls in Mayapuri Delhi šŸ’ÆCall Us šŸ”9953322196šŸ” šŸ’ÆEscort.
Call Girls in Mayapuri Delhi šŸ’ÆCall Us šŸ”9953322196šŸ” šŸ’ÆEscort.Call Girls in Mayapuri Delhi šŸ’ÆCall Us šŸ”9953322196šŸ” šŸ’ÆEscort.
Call Girls in Mayapuri Delhi šŸ’ÆCall Us šŸ”9953322196šŸ” šŸ’ÆEscort.
Ā 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.ppt
Ā 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Ā 
insect anatomy and insect body wall and their physiology
insect anatomy and insect body wall and their  physiologyinsect anatomy and insect body wall and their  physiology
insect anatomy and insect body wall and their physiology
Ā 
Call Girls in Munirka Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Munirka Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls in Munirka Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Munirka Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
ā€ā€VIRUS - 123455555555555555555555555555555555555555
ā€ā€VIRUS -  123455555555555555555555555555555555555555ā€ā€VIRUS -  123455555555555555555555555555555555555555
ā€ā€VIRUS - 123455555555555555555555555555555555555555
Ā 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptx
Ā 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Ā 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistan
Ā 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
Ā 
Call Us ā‰½ 9953322196 ā‰¼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ā‰½ 9953322196 ā‰¼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ā‰½ 9953322196 ā‰¼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ā‰½ 9953322196 ā‰¼ Call Girls In Mukherjee Nagar(Delhi) |
Ā 
Welcome to GFDL for Take Your Child To Work Day
Welcome to GFDL for Take Your Child To Work DayWelcome to GFDL for Take Your Child To Work Day
Welcome to GFDL for Take Your Child To Work Day
Ā 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
Ā 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
Ā 
Call Girls in Aiims Metro Delhi šŸ’ÆCall Us šŸ”9953322196šŸ” šŸ’ÆEscort.
Call Girls in Aiims Metro Delhi šŸ’ÆCall Us šŸ”9953322196šŸ” šŸ’ÆEscort.Call Girls in Aiims Metro Delhi šŸ’ÆCall Us šŸ”9953322196šŸ” šŸ’ÆEscort.
Call Girls in Aiims Metro Delhi šŸ’ÆCall Us šŸ”9953322196šŸ” šŸ’ÆEscort.
Ā 
Solution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsSolution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutions
Ā 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are important
Ā 
Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)
Ā 
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxTwin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Ā 

Financial critical infrastructure a mas trusted architecture for alert detection and authenticated transactions

  • 1. Financial Critical Infrastructure: A MAS Trusted Architecture for Alert Detection and Authenticated Transactions Guy Guemkam (Guy.Guemkam@tudor.lu)āˆ— Christophe Feltus (Christophe.Feltus@tudor.lu)āˆ— CĆ©dric Bonhomme (Cedric.Bonhomme@tudor.lu)āˆ— Pierre Schmitt (Pierre.Schmitt@tudor.lu)āˆ— Benjamin GĆ¢teau (Benjamin.Gateau@tudor.lu)āˆ— Djamel Khadraoui (Djamel.Khadraoui@tudor.lu)āˆ— Zahia Guessoum (Zahia.Guessoum@lip6.fr)ā€  Abstract: Banking and ļ¬nancial system constitute a critical service for our economy. Being able to foreseen real time attacks and failures on ļ¬nancial institutions network is a crucial challenge. In order to face those problems, research tends to elaborate alert mechanisms in order to support risk assessment, analysis and mitigation solution for real time decision- making processes. Our previous works had proposed a multi-agent based architecture to support that alert mechanism. This architecture exploited the Multi-agent system technology and proposes a static assignment of functions to agents. This static assignment was a weakness because isolating an agent or breaking the communication channel between two of them created serious damage on the crisis management. In this paper, we complete our previous works and make mobile the assignment of functions to agents. Our approach exploits the concept of agent responsibility that we assigned dynamically to agent taking into consideration the agent trust. This mobile assignement is illustrated by a case study that aims at adopting agentā€™s secret key according to the sensibility of the ļ¬nancial context. Keywords: trust model; responsibility; multi-agent system; bank clearing; ļ¬nancial critical infrastructure 1 Introduction Infrastructures are the basic physical and organizational structures needed for the func- tioning of a community or society, such as banking and ļ¬nancial systems. These Critical Financial Infrastructures (e.g. payment systems and clearing houses) are characterized by being so vital to a country that the incapacity or destruction of such systems would have a debilitating impact on security, national economic security, national public safety, or a combination of these [Rin04]. In fact, the ļ¬nancial critical infrastructure (FCI) are so important that a signiļ¬cant eļ¬€ort in making sure that they are not damaged or de- stroyed justiļ¬es the uprising research in that ļ¬eld. Additionally, managing the security āˆ— Public Research Centre Henri Tudor, Luxembourg-Kirchberg, Luxembourg ā€  Laboratoire IP6, UniversitĆ© Pierre et Marie Curie, Paris, France Submitted to SAR-SSI 2011 1
  • 2. G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. GĆ¢teau, Z. Guessoum, D. Khadraoui of FCI systems is a diļ¬ƒcult task oļ¬€ering numerous research challenges because they are traditionally characterized by (see Fig. 1): ā€¢ deployed on large and complex inter-institutions network, making it diļ¬ƒcult to cover all potential vulnerabilities which can be exploited to launch cyber-attacks against them; ā€¢ a very strong availability requirement, i.e. FCI systems can rarely be taken down. This can make them hard to maintain, and consequently many critical infrastructure systems run on out-dated technology which may not have been geared to cope with the threat picture of today; ā€¢ a major request concerns the conļ¬dentiality of the message, i.e. bank secrecy is extremely signiļ¬cant for the private operations, and for the state transactions as well. Continuously monitoring and adapting Public Key Infrastructure (PKI) is mandatory. Fig. 1: FCI security challenge Many critical infrastructure systems including FCI are exposed to the Internet, making cyber attacks a very real problem. According to a recent study on critical infrastructure cyber attacks [BWIM09], ā€œcritical infrastructure owners and operators report that their IT networks are under repeated cyber attack, often by high-level adversaries. The impacts of such attacks are often severe, and their cost is high and borne widelyā€œ. The situation of the FCI is that from the IT side, conceptual security is achieved via security technology watch in order to manage new vulnerabilities and avoiding new threats by the introduction of adapted security counter measures into the operational critical el- ements of the infrastructure. Associated to this, the security controls are also frequently deployed (mainly via audits) on top of the two previous actions, in order to measure the conļ¬dence that they have on the security in place. The ultimate goal here is to guarantee that the required controls are properly in place and that the security counter measures and PKI regulation are adapted to the risk situations. Beside this, in certain cases, these 2 Submitted to SAR-SSI 2011
  • 3. FCI: A MAS Trusted Architecture for Alert Detection and Authenticated Transaction critical infrastructures are interdependent (clearing processing and data exchanges) and therefore additional complex security risks are to be considered. From the business side, the FCI owners are more and more subject to speciļ¬c regulations requiring them to main- tain an assessment and ongoing management of systemic risks by the national ļ¬nancial supervision institutions [Act02, Bas06]. A systemic risk, as deļ¬ned by the European par- liament, is a risk of disruption in the ļ¬nancial system with the potential to have serious negative consequences for the internal market and the real economy. All types of ļ¬nancial intermediaries, markets and infrastructure may be potentially systemically important. Our state of the art in this ļ¬eld [FKA10] has highlighted that many architectures has already been elaborated to support the reaction after problem detection. Those architec- tures are mostly elaborated based on a multi-agent system (MAS) approach that oļ¬€ers the possibility to work in a decentralized and heterogeneous environment. However, we have observed that those architectures are based on a static assignment of functions to agents. As a consequence, isolating an agent or breaking the communication channel between two of them could create serious damage on the management of the crisis. In this paper, we propose an innovative approach for making dynamic the assignment of functions to agents. Our approach exploits the concept of agent responsibility that we dynamically assign de- pending on the crisis situation. Additionally, the crisis context makes vary the agent ability to react (e.g. agent momentary isolated or decreased capability to quickly react). In order to consider that constraints, we introduce the agent trust based on reputation as a parameter that inļ¬‚uence the assignment. Section 2 depicts the reaction mechanism case study. Section 3 presents the respon- sibilities model and section 4 the responsibility to agent assignment function. Section 5 introduces the trust and reputation calculus method and section 6 the dynamic assignment of responsibilities to agents based on the reputation. 2 Reaction mechanism case study The agents that compose the architecture are the following: ā€¢ The ACE collects, aggregates and analyses network informations coming from probes deployed over the network and customer node. Conļ¬rmed alerts are sent to the Policy Instantiation Engine (PIE); ā€¢ The PIE receives conļ¬rmed alert from the ACE, sets the severity level and the extent of the network response (depending on the alert layer). The PIE instantiates high level alert messages which have to be deployed. Finally the high level alert messages are transferred to the Reaction Deployment Point (RDP); ā€¢ The RDP (Fig. 3) is composed of two modules. The Cryptography Analysis (CA) is in charge of analyzing the keys previously instantiated by the PIE. Therefore, the Crypto Status stores required properties for a secure asymetric key so that the CA module is able to check the eligibilty of the newly received key to be deployed. Con- cretely the CA will check the key strength, if the key has not been used or revoked, test if the cryptographic key is not badly generated (modulus-facotrization, etc.). The second module, the Component Conļ¬guration Mapper, selects the appropriate communication channel. Submitted to SAR-SSI 2011 3
  • 4. G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. GĆ¢teau, Z. Guessoum, D. Khadraoui The reaction mechanism (Fig. 2) aims at adapting the ciļ¬€ering of the data according to the bank interface whenever on alert occurs. This section presents the core components of the reaction mechanism. Agents are disseminated on three layers corresponding to the clearing mechanism1 (customer/issuer, acquiring/issuing processing) and they retrieve information from probes located at the network layer and representing diļ¬€erent values: network traļ¬ƒc, DoS attack (denial-of-service attack, an attempt to make a computer resource unavailable to its intended users), suspicious connections attempts, ... . Fig. 2: Reaction mechanism inside Fig. 3: RDP architecture Fig. 4: SAVP architecture Fig. 4 presents two diļ¬€erent kinds of Signature Agent Veriļ¬cation Point (SAVP). Indeed, another advantage of MAS is that it is easy to implement from a model, speciļ¬c 1 Clearing denotes all activities from the time a commitment is made for a transaction until is settled. 4 Submitted to SAR-SSI 2011
  • 5. FCI: A MAS Trusted Architecture for Alert Detection and Authenticated Transaction agents in order to performs speciļ¬c tasks. Concretely it is adapted to the usage and practical deployment in that it coincides (e.g. shop terminal, smartphone, ATM, etc.) and sends alerts to appropriate level (cutsomer, processing, clearing). Moreover, our attack prevention system is easily extensible for future interface category. SAVPs receive generic alert messages from the RDP. Then a speciļ¬c parser converts the incoming key type to the appropriate format according to the interface. In order to consider the mutual trust between agents, each agent is associated to a database of levels of trust towards its pairs. This means e.g. that the SAVP has a dedicated level of trust for the ACE and the RDP. This database can be accessed by Utopia [SBAG11], the MAS framework we use to control the assignment of responsibility in an intelligent manner by taking the level of trust between agents into account. The reaction alert architecture presented in this section is based on the ReD (Reaction after Detection) project [FKA10]. The ReD project deļ¬nes and designs a solution to enhance the detection/reaction process and improves the overall resilience of critical infrastructures. Fig. 5 introduces the developed architecture illustrated with our clearing network alert system. The ļ¬‚ow is supposed to begin with an alert detected by a probe (connected to the SAVP at the bottom of the ļ¬gure). This alert is sent to the ACE agent (customer layer) that does or does not conļ¬rm the alert to the PIE. Afterwards, the PIE decides to adapt key or to forward the alert to an ACE of a higher layer (acquiring/issuring). The PIE agent sends key policy to the RDP agent, which decides which SAVP is able to transform the high level alert message into an understandable format for the selected interface category. In order to manage access rights, we have incorporated to ReD a Context Rights Management module (CRM). Block on the right on Fig. 5. The CRM is in charge of providing access rights to agents (E.g. SAVP to the probes and Logs File database, RDP to the keys Status database). The CRM uses the rights and the crisis context database and is able to detect changes in the situation thanks to Utopia functions. The ļ¬rst database includes the access rights corresponding to the responsibilities and the second database includes a set of crisis contexts. Thanks to these databases the CRM agent is able to provide adequate rights at operational layer to an agent depending on the context. 3 Agent Responsibility Model In a non-crisis context, agents are assigned to responsibilities like RDP, PIE, SAVP, etc. Those assignments of responsibilities to agents require speciļ¬c access rights. By analyzing for instance the activity of monitoring the bank Internet access (Fig. 5), we can e.g. observe that the SAVPā€™s have the responsibility to collect the number of connection from diļ¬€erent IP adresses (to prevent DoS attack) or the location of the connection, to make a basic correlation between the values and the antecedent values records (stocked in the Logs File database) and to report this analysis to the ACE in case of suspected alert. To perform the monitoring activity, the SAVP are assigned to precise obligations and gain corresponding access rights recorded in the access right database Those rights are e.g.: access to the log ļ¬le or network ATM. When a crisis occurs, for instance if a DoS is detected and isolates some SAVP agents from the rest of the network, the normal monitoring rules and procedures do no longer work as usual and it is requested to change the responsibility of the agents. In the above case, other agents have to assure the responsibilities of the Submitted to SAR-SSI 2011 5
  • 6. G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. GĆ¢teau, Z. Guessoum, D. Khadraoui Fig. 5: Detailed reaction architecture for the clearing infrastructure isolated SAVP. To assure their new responsibilities the agents request additional access rights e.g. monitoring probes related to the isolated ATM. In practice, the automatic assignment of rights to agents depending on their respon- sibilities is not immediate and this contradicts the need to react promptly to the attack or to the problem. To tackle the weakness, our approach is based on the reļ¬nement of the agent responsibility and on the granting of access rights based on responsibility. The right management module exploits two databases accessed by the CRM agent. The ļ¬rst database includes the rights corresponding to the responsibilities and the second includes a set of crisis contexts. Each crisis context deļ¬nes, depending on the type of crisis, which agent is assigned to which responsibility. The review of the literature highlights that the deļ¬nition of the agent responsibility is mostly incomplete and that most of the architecture only considering the agent against the outcome that he has to produce. Sometimes, advanced solutions integrate the inputs that those agents request to perform the outcome. We deļ¬ne responsibility as a state assigned to an agent to signify him its obligations concerning the task, its accountabilities regarding its obligations, and the rights and capabilities necessary to perform it. In order to integrate a dynamic re-assignment of the responsibility from one agent working in normal conditions to one agent working in a crisis environment, we consider all the concepts which compose the responsibility. In [FP09] we have proposed a responsibility model that can be used to depict the agent responsibility. This model integrates the main 6 Submitted to SAR-SSI 2011
  • 7. FCI: A MAS Trusted Architecture for Alert Detection and Authenticated Transaction following concepts: Obligation is a duty which links a responsibility with a task that must be performed. Accountability is a duty to justify achievement, maintenance or avoidance of some given state to an authority under the threat of sanction [Sta06]. Accountability contribute to generate trust or to remove trust depending of the accountability outcomes. Right encompasses facilities required by an agent to fulļ¬ll its obligations, e.g. the access right that the agent gets once it is assigned responsible. Capability describes the requisite qualities, skills or resources necessary to perform a task. Capability may be declined through knowledge or know-how, possessed by the agent such as ability to make a decision, its processing time, its faculty to analyze a problem, and its position on the network. Fig. 6: Agent responsibility model Commitment pledged by the agent represents its engagement to fulļ¬ll a task and the assurance that it does it in respect of good practices. The commitment in MAS has already been subject to many researches as explained in [Sin08]. The semantic analyzes commit- ment [SD09] and [MDHV02] advocates to consider the mutual trust between agents as a pragmatic commitment antecedent [GBKD07]. The trust component signiļ¬es the lower trust value that is necessary for an agent to be assigned responsible and is determined by the importance of the obligation that is to be achieved. Based on the agent responsibility model of Fig. 6, we deļ¬ne the responsibilities for each agent of the architecture. Table 1 summarizes the SAVP and the ACE responsibilities used in practice for the dynamic assignment (section 4). Due to the extent of this paper, only the responsibility for two of them is presented: the SAVP and the ACE, and only the 4 most signiļ¬cant components of the responsible are exploited: Obligations, Trust, Capabilities and Rights. For the SAVP, we observe that responsibility includes obligations such as the obligation to retrieve logs from the component it monitors (ATM, IP network, shop VISA interface, ...), to provide an immediate reaction if necessary, to report the incident to the RDP, etc. To perform this obligation, it needs the capabilities to be on the same network as the component it controls and to communicate with the ACE and the facilitator agent. It also must have the right to read log on the ATM or other interface category parameters on the concerned network component and to write the values down in a central logs database. Submitted to SAR-SSI 2011 7
  • 8. G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. GĆ¢teau, Z. Guessoum, D. Khadraoui Obligations Trust Capabilities Rights SAVP ā€¢ Retrieve the logs from the component it monitors; ā€¢ Provide an immedi- ate reaction if neces- sary; ā€¢ Communicate with the facilitator to get the address of the other components (ACE, CRM); ā€¢ Report the incident to the ACE. 0.8 ā€¢ SAVP must be on the same network as the parameter (browser, ATM, shop, etc.) it monitors; ā€¢ SAVP must be able to communicate with the ACE and the facilitator agent. Read parameter value on the concerned net- work component Write parameter value in the central logs database ACE ā€¢ Decide which keys are appropriated to be deployed by the SAVP; ā€¢ Conļ¬rm the alert to the PIE; ā€¢ Communicate with the facilitator to get the address of the other components (SAVP, CRM). 0.9 ā€¢ Fast bandwidth; ā€¢ High CPU re- sources; ā€¢ Central position on the network. ā€¢ No speciļ¬c right. Tab. 1: Agents Responsibilities Speciļ¬cations 4 Responsibility to Agent Assignement To assign responsibilities to agents, we have associated our architecture with Utopia an insTitution Oriented ProgrammIng frAmework which aims at simplify agent based insti- tutions programming. This architecture provides organizational speciļ¬cation for agents institutions using MoiseInst . Fig. 7: MoiseInst organization 8 Submitted to SAR-SSI 2011
  • 9. FCI: A MAS Trusted Architecture for Alert Detection and Authenticated Transaction MoiseInst (Fig. 7.) is an Organization Speciļ¬cation (OS) system composed of four dimensions: ā€¢ Structural Speciļ¬cation (SS); ā€¢ Functional Speciļ¬cation (FS); ā€¢ Contextual Speciļ¬cation (CS); ā€¢ Normative Speciļ¬cation (NS). These speciļ¬cations are described in a XML ļ¬le and loaded by Utopia. From this deļ¬ned organization, Utopia instantiates a framework allowing to specify responsibilities and trust, and as consequence, to establish the agent responsible in terms of tasks, obli- gations, rights and trust. In the following, we explain the Structural and the Functional Speciļ¬cations which are related to the trust parameter. The paper [GBKD07] addresses these speciļ¬cations in details. The Structural Speciļ¬cation (Fig. 8) deļ¬nes (i) the responsibilities which agents are assigned to in the Organization (ii) the relations between the responsibilities in terms of data exchange during the execution of the tasks. E.g. <Link source=ā€SAVPā€ destina- tion=ā€ACEā€/> speciļ¬es that the SAVP is allowed to send information to the ACE (iii) the Groups of agents assigned to the same responsibility. E.g. <Responsibility id=ā€SAVPā€ min=ā€3ā€ max=ā€3ā€/> creates a SAVP group with a cardinality sets to 3. And (iv) the initial level of trust of each agent. E.g. According to Fig. 8 the level of trust for the ACE is set to 0.5 at boot. This value will change over the time based on acknowledgment and task performance. Fig. 8: Structural Speciļ¬cation schema In case of a crisis, if a SAVP from a SAVP group is corrupted, the responsibility of that failing agent is transferred to new agents from the same group. The Functional Speciļ¬cation (FS) on Fig. 9 deļ¬nes global business processes that can be executed by the diļ¬€erent agents participating to the Organization according to their responsibilities and Groups. Submitted to SAR-SSI 2011 9
  • 10. G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. GĆ¢teau, Z. Guessoum, D. Khadraoui Fig. 9: Functional Speciļ¬cation schema 5 Trust and reputation management The trust and reputation model (TRM) evaluates the responsability fulļ¬llment of each component involved in the architecture. A large review of computational trust models can be found in [SS05] and more details for cognitive aspects of trust is presented in [CF98]. The proposed reputation-based trust management scheme is used to predict the future behavior of a component in order to establish trust among agents and hence to improve security in the system. The way trust information is quantiļ¬ed depends on the applica- tion ļ¬eld. Some authors used probabilistic approaches [VMC10] [PTJL05] [MMA+ 01] to quantify trust. This approach is used in several ļ¬elds such as Mobile Ad-hoc Networks, Social Networks or e-commerce. Other approaches such as Fuzzy approaches or Bayesian networks [BB04][BB02][TPJL06] are also exploited to quantify trust with some diļ¬€erences, if a ageing factor is used or not, the way reputation parameters are aggregated. The infor- mation needed to evaluate the trustworthiness of a component is provided by the SAVPā€™s probe. Fig. 10: Reputation Repartion Schema As mentioned in the agent responsibility speciļ¬cations, if one of the SAVPā€™s agents is not trustworthy because for instance it has been corrupted, it has to be removed and 10 Submitted to SAR-SSI 2011
  • 11. FCI: A MAS Trusted Architecture for Alert Detection and Authenticated Transaction replaced. The assignment of a new responsibility to another SAVP (SAVP1 or SAVP2 in Fig. 10) is done based on the trust value of that agent. 5.1 Computing trust and reputation The trust (T) and reputation (R) of each component is provided by trust assessment regarding an SAVP agent based on direct information collected by the SAVP agents himself and by second hand-information coming from other ACE to which it belongs. This trust based reputation is calculated at time t as follows: TACE1āˆ’SAV P 2 = RACE1āˆ’SAV P 2 = DRACE1āˆ’SAV P 2 (1) Where DRACE1āˆ’SAV P 2 is the reputation derived from the direct reputation of SAVP2 in the view of ACE1. The scenario depicted in Fig. 10 shows that ACE1 has no direct connectivity with SAVP2 and has to rely on information coming from ACE2. In this case (1) leads to (2): TACE1āˆ’SAV P 2 = RACE1āˆ’SAV P 2 = DRACE1āˆ’SAV P 2 + Ī» āˆ— IRACE1āˆ’SAV P 2 (2) Where Ī» is the weighted factor associated to the reputation value and IRACE1āˆ’SAV P 2 is the indirect reputation value provided by other agents about agent SAVP2. In the followings we presented how the direct reputation (DR) and the indirect reputation (IR) are calculated. The direct reputation is deļ¬ned as the probability evaluated by ACE1 that ACE2 will achieve his goal at the next solicitation. Several approaches can be used to deal with reputation information such as Beta, Gaussian, Poisson, binomial. [BB02] prooves that the Beta distribution system is the most promising due to its ļ¬‚exibility and simplicity as well as its strong foundation on the theory of statistics. Our model used the Beta probability density function Beta(Ī±, Ī²) as shown in equation (3) to represent direct reputation. p(Īø) = Beta(Ī±, Ī²) = Ī“(Ī± + Ī²) Ī“(Ī±)Ī“(Ī²) ĪøĪ±āˆ’1 ĪøĪ²āˆ’1 (3) Where Īø represents the probability that the next event will occur. This Beta function is indexed with two parameters Ī± and Ī², which represent the sum of positive and negative assessment, respectively that ACE1 has for ACE2. We consider that ACE1 rates ACE2 during an assessment in a binary scale (positive (1), negative (0)). The direct reputation value is the mean of the Beta distribution between ACE1 and ACE2. Reputation value for agent ACE2 about agent ACE1 is calculated as the expectation value of Beta(Ī±, Ī²) with E equal the standard deviation : RACE1āˆ’ACE2 = E(Beta(Ī±, Ī²)) (4) An agent ACE1 is trusted by agent ACE2 if and only if RACE1āˆ’ACE2 ā‰¤ Ļ„ where Ļ„ is a threshold value from which the agent is considered trustworthy. This threshold is deļ¬ned by the responsibilities speciļ¬cations. For instance, the trust threshold for SAVP agents is set to 0.8. Initially, Ī± = Ī² = 0, which corresponds to uniform distribution and indicates absence of knowledge. Submitted to SAR-SSI 2011 11
  • 12. G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. GĆ¢teau, Z. Guessoum, D. Khadraoui RACE1āˆ’ACE2 = E(Beta(Ī±, Ī²)) = Ī± + 1 Ī± + Ī² + 2 (5) The update of this reputation value is done with respect to the Beta function. This trust represents the trustworthiness of one agent to another. In order to highlight the impact of recent behavior, the ageing factor is introduced. We assume that this ageing factor g depends on the context. This value is update in (6) as follows: Ī±new ACE1āˆ’ACE2 = g āˆ— Ī±ACE1āˆ’ACE2 and Ī²new ACE1āˆ’ACE2 = g āˆ— Ī²ACE1āˆ’ACE2 (6) A small value of g gives more weight to recent trust values. However choosing the right value of g is not straightforward. For this purpose, we assume that the value of g is chosen by a Human at the initialization of the system. Unlike the components weights which represents the personal view that an agent has to another. Our solution for setting components weights is based on the similarity beliefs between two agents. This similarity is based on the assumption that if two agents rate a third agent in the same way, this means that they have similar beliefs and views of this agent. Given two agents ACE1 and ACE2, let the set (ACE1, ACE2) be the set of all mutual agents, that both ACE1 and ACE2 have interacted with and hence have a direct reputation with those agents in (7) as follows: Set(ACE1, ACE2) = {c, d, e, ..., n} (7) The similarity belief (Ī›) between those two agents is given in (8). Ī› = Sim(ACE1, ACE2) = 1 āˆ’ Dis(ACE1, ACE2) (8) Where the distance function between 2 agents ACE1, ACE2 is calculated in (9) based on the Euclidian method. Dis(ACE1, ACE2) = iāˆˆSet(ACE1,ACE2) (RACE1āˆ’ACEi āˆ’ RACE2āˆ’ACEi)2 (9) By doing that, an agent can have no common direct history with another and in the same time have a trustworthy (or not) view of that agent. Agents ACE1 ACE2 Ī» CRM CRM SAVP1 unknown 0.6 unknown 0.8 SAVP2 unknown 0.8 unknown 0.9 SAVP3 unknown 0.1 unknown 0.16 ACE1 0.8 0.6 0.8 ACE2 0.9 0.7 0.7 Tab. 2: Example of Reputation Calculation 12 Submitted to SAR-SSI 2011
  • 13. FCI: A MAS Trusted Architecture for Alert Detection and Authenticated Transaction Table 2 represents the reputation value that the agents have for each other based on their common past interaction history. The grey boxes represent the reputation that agent has about itself. This is not possible since we assume that reputation is not reļ¬‚exive. The unknown value means that Utopia has no common history with that agent. 5.2 Example of responsibility assignments based on reputation. In a normal situation one agent is assigned to a SAVP responsibility, each agent is asso- ciated to one or more probes (ATM, IP network,...) and reports to the ACE. Each time a SAVP agent wants to access a component of the network, it previously needs to contact the CRM that consults the access rights database in order to retrieve the rights associated to the responsibility assigned to the agent. Based on the values of the Table 2, CRM allows to transfer the responsibilities of the corrupted agent. During an abnormal situation, the context evolves and an appropriate crisis context should be selected. Each context is adapted to a speciļ¬c case. In this use case, the crisis concerns the corruption of the SAVP3 agent and calls for a transfer of that agent responsibility from the corrupted agent to another agent from the same group. That transfer of responsibility implies, in the mean time, a transfer of access rights. The diagram of activities, as highlighted by white numbers in black circles on Fig. 5, is the following: 1. Under a threshold of 0.5, CRM considers that an agent is no longer trustworthy. According to Table 2, the trust level of the SAVP3 is set to 0.16. Consequently the CRM adapts and sends the new crisis context to Utopia. Based on that context, the CRM is able to update the access rights data base; 2. Afterwards, the SAVP3 loses its access rights and is isolated, and the responsibilities of SAVP3 are transferred to the SAVP2 which has a reputation of 0.9; 3. The agent SAVP2 that receive the additional SAVP3 responsibilities requests the access rights corresponding to that responsibility to the CRM. 6 Conclusions Critical infrastructures are more and more present and needs to be seriously managed and monitored regarding the increasing amount of threats. This paper presents a solution for bank clearing security using a MAS based architecture. The system, initially developed based on static assignments of responsibilities to agents, has needs for more dynamism in order to keep aligned to the new arising risks. This paper ļ¬rstly addresses the new challenge by providing a framework for dynamically assigning responsibilities to agents depending on the crisis context. That contextualized responsibility assignment permits, in ļ¬ne, to manage the agent access rights to critical information. Secondly, the paper enhances that dynamic assignment taking into account the trust and reputation between the agents during the assignment mechanism. The architecture we exploit to demonstrate the enhanced reaction mechanism, relies on the two main pillars ReD and Utopia, which are being tested and currently produced in our labs. Practically ReD deļ¬nes the structural bases for the clearing mechanism and Submitted to SAR-SSI 2011 13
  • 14. G. Guemkam, C. Feltus, C. Bonhomme, P. Schmitt, B. GĆ¢teau, Z. Guessoum, D. Khadraoui Utopia permits to deploy the responsibilities to agents. The paper is illustrated based on a use case that shows how the transfer of rights for a corrupted SAVP is performed during an evolution from normal to crisis situation. Acknowledgment This research was funded by the National Research Fund of Luxembourg in the context of TITAN (Trust-Assurance for Critical Infrastructures in Multi-Agents Environments, FNR CO/08/IS/21) project. References [Act02] S.O. Act. Sarbanes-Oxley Act. In United States of America 107th congress, US Congress (2002) Available from:(http://www. sec. gov/about/laws/soa2002. pdf), 2002. [Bas06] II Basel. International convergence of capital measurement and capital stan- dards. A revised framework, 2006. [BB02] S. Buchegger and J.-Y. Le Boudec. The Beta Reputation System. 15th Bled Conference on Electronic Commerce, Bled, Slovenia, 17-19 June 2002, 2002. [BB04] S. Buchegger and J.-Y. Le Boudec. A Robust Reputation System for Peer- to-Peer and Mobile Ad-hoc Networks. P2PEcon 2004, Cambridge, MA, 4-5 June, 2004. [BWIM09] S. Baker, S. Waterman, G. Ivanov, and Inc McAfee. In the Crossļ¬re: Critical Infrastructure in the Age of Cyber War. McAfee, Inc., 2009. [CF98] C. Castelfranchi and R. Falcone. Principles of trust for mas: Cognitive anatomy, social importance, and quantiļ¬cation. In Yves Demazeau, editor, ICMAS, pages 72ā€“79. IEEE Computer Society, 1998. [FKA10] C. Feltus, D. Khadraoui, and J. Aubert. A Security Decision-Reaction Ar- chitecture for Heterogeneous Distributed Network. In Availability, Reliability, and Security, 2010. ARESā€™10 International Conference on, pages 1ā€“8. IEEE, 2010. [FP09] C. Feltus and M. Petit. Building a Responsibility Model Including Account- ability, Capability and Commitment. In Availability, Reliability and Security, 2009. ARESā€™09. International Conference on, pages 412ā€“419. IEEE, 2009. [GBKD07] B. GĆ¢teau, O. Boissier, D. Khadraoui, and E. Dubois. Controlling an in- teractive game with a multi-agent based normative organizational model. In J. VĆ”zquez-Salceda, G. Boella, O. Boissier, and E. Matson, editors, Post- Proceedings of the Workshop COIN at the 17th ECAI conference, LNCS 4386, pages 86ā€“100. Springer-Verlag, 2007. ISBN: 978-3-540-74457-3. [MDHV02] J.B. Mehdi, M. Dastani, Z. Huang, and L. Van Der Torre. Trust and Com- mitment in Dynamic Logic. In In Procs. of EurAsia ICT 2002, LNCS 2510. Citeseer, 2002. 14 Submitted to SAR-SSI 2011
  • 15. FCI: A MAS Trusted Architecture for Alert Detection and Authenticated Transaction [MMA+ 01] Lik Mui, Mojdeh Mohtashemi, Cheewee Ang, Peter Szolovits, and Ari Hal- berstadt. Ratings in Distributed Systems: A Bayesian Approach, 2001. [PTJL05] J. Patel, W. T. Luke Teacy, N. R. Jennings, and M. Luck. A probabilistic trust model for handling inaccurate reputation sources. In Peter Herrmann, ValĆ©rie Issarny, and Simon Shiu, editors, iTrust, volume 3477 of Lecture Notes in Computer Science, pages 193ā€“209. Springer, 2005. [Rin04] S.M. Rinaldi. Modeling and simulating critical infrastructures and their in- terdependencies. 2004. [SBAG11] P. Schmitt, C. Bonhomme, J. Aubert, and B. GĆ¢teau. Programming Elec- tronic Institutions with Utopia. In W. Aalst, J. Mylopoulos, N. M. Sadeh, M. J. Shaw, C. Szyperski, P. Soļ¬€er, and E. Proper, editors, Information Sys- tems Evolution, volume 72 of Lecture Notes in Business Information Process- ing, pages 122ā€“135. Springer Berlin Heidelberg, 2011. [SD09] M.J. Smith and M. Desjardins. Learning to trust in the competence and com- mitment of agents. Autonomous Agents and Multi-Agent Systems, 18(1):36ā€“ 82, 2009. [Sin08] M.P. Singh. Semantical considerations on dialectical and practical com- mitments. In Proceedings of the 23rd Conference on Artiļ¬cial Intelligence (AAAI), pages 176ā€“181, 2008. [SS05] J. Sabater and C. Sierra. Review on computational trust and reputation models. Artiļ¬cial Intelligence Review, 24(1):33ā€“60, September 2005. [Sta06] B. Stahl. Accountability and Reļ¬‚ective Responsibility in Information Systems. The Information Society: Emerging Landscapes, pages 51ā€“68, 2006. [TPJL06] W. T. Luke Teacy, J. Patel, N. R. Jennings, and M. Luck. Travos: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems, 12(2):183ā€“198, 2006. [VMC10] G. Vogiatzis, I. MacGillivray, and M. Chli. A probabilistic model for trust and reputation. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1-Volume 1, pages 225ā€“232. Interna- tional Foundation for Autonomous Agents and Multiagent Systems, 2010. Submitted to SAR-SSI 2011 15