810
Views
16
CrossRef citations to date
0
Altmetric
Articles

Distributed reinforcement learning for adaptive and robust network intrusion response

, &
Pages 234-252 | Received 08 Sep 2014, Accepted 05 Jan 2015, Published online: 15 Apr 2015

References

  • Agogino, A. K., & Tumer, K. (2008). Analyzing and visualizing multiagent rewards in dynamic and stochastic domains. Autonomous Agents and Multi-Agent Systems, 17(2), 320–338. doi: 10.1007/s10458-008-9046-9
  • Anstee, D., Cockburn, A., & Sockrider, G. (2013). Worldwide infrastructure security report (Technical report). Arbor Networks.
  • Claus, C., & Boutilier, C. (1998). The dynamics of reinforcement learning in cooperative multiagent systems. AAAI conference on artificial intelligence, Madison, Wisconsin, USA.
  • Colby, M., & Tumer, K. (2013). Multiagent reinforcement learning in a distributed sensor network with indirect feedback. Proceedings of the 12th international joint conference on autonomous agents and multiagent systems, Saint Paul, Minnesota, USA.
  • Devlin, S., Yliniemi, L., Tumer, K., & Kudenko, D. (2014). Potential-based difference rewards for multiagent reinforcement learning. Proceedings of the 13th international conference on autonomous agents and multiagent systems, Paris, France.
  • Douligeris, C., & Mitrokotsa, A. (2004). Ddos attacks and defense mechanisms: classification and state-of-the-art. Computer Networks, 44(5), 643–666. doi: 10.1016/j.comnet.2003.10.003
  • HolmesParker, C., Agogino, A., & Tumer, K. (2013). Combining reward shaping and hierarchies for scaling to large multiagent systems. Knowledge Engineering Review.
  • Hussain, A., Heidemann, J., & Papadopoulos, C. (2003). A framework for classifying denial of service attacks. Proceedings of the 2003 conference on applications, technologies, architectures, and protocols for computer communications, Karlsruhe, Germany.
  • Jung, J., Krishnamurthy, B., & Rabinovich, M. (2002). Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites. Proceedings of the 11th international conference on World Wide Web, Honolulu, Hawaii, USA.
  • Keromytis, A. D., Misra, V., & Rubenstein, D. (2002). Sos: secure overlay services. Proceedings of ACM SIGCOMM, Pittsburgh, Pennsylvania, USA.
  • Mahajan, R., Bellovin, S. M., Floyd, S., Ioannidis, J., Paxson, V., & Shenker, S. (2002). Controlling high bandwidth aggregates in the network. Computer Communication Review, 32(3), 62–73. doi: 10.1145/571697.571724
  • Malialis, K., & Kudenko, D. (2013). Multiagent router throttling: Decentralized coordinated response against ddos attacks. Proceedings of the 25th conference on innovative applications of artificial intelligence (AAAI / IAAI), Bellevue, Washington, USA.
  • Malialis, K., & Kudenko, D. (2015). Distributed response to network intrusions using multiagent reinforcement learning. Engineering Applications of Artificial Intelligence. Retrieved from http://dx.doi.org/10.1016/j.engappai.2015.01.013
  • Mirkovic, J., & Reiher, P. L. (2004). A taxonomy of ddos attack and ddos defense mechanisms. Computer Communication Review, 34(2), 39–53. doi: 10.1145/997150.997156
  • Papadopoulos, C., Hussain, A., Govindan, R., Lindell, R., & Mehringer, J. (2003). Cossack: Coordinated suppression of simultaneous attacks. DARPA information survivability conference and exposition, Arlington, Virginia, USA.
  • Savage, S., Wetherall, D., Karlin, A., & Anderson, T. (2000). Practical network support for ip traceback. ACM SIGCOMM Computer Communication Review, 30(4), 295–306. doi: 10.1145/347057.347560
  • Sutton, R. S., & Barto, A. G. (1998). Introduction to Reinforcement Learning. Cambridge, MA: MIT Press.
  • Tumer, K., & Agogino, A. (2007). Distributed agent-based air traffic flow management. Proceedings of the 6th international joint conference on autonomous agents and multiagent systems, Honolulu, Hawaii, USA.
  • Wolpert, K. R. W., David, H., & Tumer, K. (2000). Collective intelligence for control of distributed dynamical systems. Europhysics Letters, 49(6), 708. doi: 10.1209/epl/i2000-00208-x
  • Yan, J., Early, S., & Anderson, R. (2000). The xenoservice-a distributed defeat for distributed denial of service. Proceedings of the information survivability workshop, Boston, Massachusetts, USA.
  • Yau, D. K. Y., Lui, J. C. S., Liang, F., & Yam, Y. (2005). Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Transactions on Networking (TON), 13(1), 29–42. doi: 10.1109/TNET.2004.842221

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.