adaptive agent
Recently Published Documents


TOTAL DOCUMENTS

165
(FIVE YEARS 5)

H-INDEX

17
(FIVE YEARS 0)

2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Bashar Ahmad Khalaf ◽  
Salama A. Mostafa ◽  
Aida Mustapha ◽  
Mazin Abed Mohammed ◽  
Moamin A. Mahmoud ◽  
...  

Currently, online organizational resources and assets are potential targets of several types of attack, the most common being flooding attacks. We consider the Distributed Denial of Service (DDoS) as the most dangerous type of flooding attack that could target those resources. The DDoS attack consumes network available resources such as bandwidth, processing power, and memory, thereby limiting or withholding accessibility to users. The Flash Crowd (FC) is quite similar to the DDoS attack whereby many legitimate users concurrently access a particular service, the number of which results in the denial of service. Researchers have proposed many different models to eliminate the risk of DDoS attacks, but only few efforts have been made to differentiate it from FC flooding as FC flooding also causes the denial of service and usually misleads the detection of the DDoS attacks. In this paper, an adaptive agent-based model, known as an Adaptive Protection of Flooding Attacks (APFA) model, is proposed to protect the Network Application Layer (NAL) against DDoS flooding attacks and FC flooding traffics. The APFA model, with the aid of an adaptive analyst agent, distinguishes between DDoS and FC abnormal traffics. It then separates DDoS botnet from Demons and Zombies to apply suitable attack handling methodology. There are three parameters on which the agent relies, normal traffic intensity, traffic attack behavior, and IP address history log, to decide on the operation of two traffic filters. We test and evaluate the APFA model via a simulation system using CIDDS as a standard dataset. The model successfully adapts to the simulated attack scenarios’ changes and determines 303,024 request conditions for the tested 135,583 IP addresses. It achieves an accuracy of 0.9964, a precision of 0.9962, and a sensitivity of 0.9996, and outperforms three tested similar models. In addition, the APFA model contributes to identifying and handling the actual trigger of DDoS attack and differentiates it from FC flooding, which is rarely implemented in one model.


2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Fakhra Jabeen ◽  
Charlotte Gerritsen ◽  
Jan Treur

AbstractParents play an important role in the mental development of a child. In our previous work, we addressed how a narcissistic parent influences a child (online/offline) when (s)he is happy and admires the child. Now, we address the influence of a parent who is not so much pleased, and may curse the child for being the reason for his or her unhappiness. An abusive relationship with a parent can also cause trauma and poor mental health of the child. We also address how certain coping behaviors can help the child cope with such a situation. Therefore, the aim of the study is threefold. We present an adaptive agent model of a child, while incorporating the concept of mirroring through social contagion, the avoidance behaviors from a child, and the effects of regulation strategies to cope with stressful situations.


2020 ◽  
Author(s):  
Fakhra Jabeen ◽  
Charlotte Gerritsen ◽  
Jan Treur

Abstract Parents play an important role in the mental development of a child. In our previous work, we addressed how a narcissistic parent influences a child (online/offline) when (s)he is happy and admires the child. Now, we address the influence of a parent who is not so much pleased and, may curse the child for being the reason for his or her unhappiness. An abusive relationship with a parent can also cause trauma and poor mental health of the child. We also address how certain coping behaviors can help the child cope with such a situation. Therefore, the aim of the study is three folds. We present an adaptive agent model of a child, while incorporating the concept of mirroring through social contagion, the avoidance behaviors from a child, and the effects of regulation strategies to cope with stressful situations.


2020 ◽  
Vol 186 ◽  
pp. 106390
Author(s):  
Kashif Imran ◽  
Jiangfeng Zhang ◽  
Anamitra Pal ◽  
Abraiz Khattak ◽  
Kafait Ullah ◽  
...  

2020 ◽  
Vol 17 (4) ◽  
pp. 172988142094021
Author(s):  
Xiaoci Huang ◽  
Jianjun Yi ◽  
Yang Chen ◽  
Xiaomin Zhu ◽  
Zhiyong Dai

The online monitoring of water environments is urgently needed. A feasible and effective approach is the use of agents. Water environments, similar to other real-world environments, present many changing and unpredictable situations. To ensure flexibility in such an environment, agents should be prepared to deal with various situations. In this study, we focused on an adaptive agent tracking approach for oil contamination. An integrated tracking framework, which is used to track the moving contour of oil pollution via a system comprising multiple unmanned surface vehicles, is proposed. The zigzag, unmanned underwater vehicle-gas, cloverleaf trajectory and curvature-weighted deployment algorithm methods are employed with consideration of their suitability to our approach. A cyclic particle swarm optimisation–Kalman method is also proposed. The possible position of moving vertices is predicted by the Kalman filter, and an objective search region is generated around the centre position. Moreover, particle swarm optimisation is performed to search for the best target position in this region. This particle swarm optimisation–Kalman method is circle operated to compensate for the deficiency of a few agents. To evaluate the approach, we conduct usability and performance simulations.


Computers ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 12 ◽  
Author(s):  
Peeranut Chindanonda ◽  
Vladimir Podolskiy ◽  
Michael Gerndt

Internet of Things (IoT) covers scenarios of cyber–physical interaction of smart devices with humans and the environment and, such as applications in smart city, smart manufacturing, predictive maintenance, and smart home. Traditional scenarios are quite static in the sense that the amount of supported end nodes, as well as the frequency and volume of observations transmitted, does not change much over time. The paper addresses the challenge of adapting the capacity of the data processing part of IoT pipeline in response to dynamic workloads for centralized IoT scenarios where the quality of user experience matters, e.g., interactivity and media streaming as well as the predictive maintenance for multiple moving vehicles, centralized analytics for wearable devices and smartphones. The self-adaptation mechanism for data processing IoT infrastructure deployed in the cloud is horizontal autoscaling. In this paper we propose augmentations to the computation schemes of data processing component’s desired replicas count from the previous work; these augmentations aim to repurpose original sets of metrics to tackle the task of SLO violations minimization for dynamic workloads instead of minimizing the cost of deployment in terms of instance seconds. The cornerstone proposed augmentation that underpins all the other ones is the adaptation of the desired replicas computation scheme to each scaling direction (scale-in and scale-out) separately. All the proposed augmentations were implemented in the standalone self-adaptive agent acting alongside Kubernetes’ HPA such that limitations of timely acquisition of the monitoring data for scaling are mitigated. Evaluation and comparison with the previous work show improvement in service level achieved, e.g., latency SLO violations were reduced from 2.87% to 1.70% in case of the forecasted message queue length-based replicas count computation used both for scale-in and scale-out, but at the same time higher cost of the scaled data processor deployment is observed.


Sign in / Sign up

Export Citation Format

Share Document