SlideShare a Scribd company logo
1 of 13
Download to read offline
Alert-BDI: BDI Model with Adaptive Alertness
through Situational Awareness
Manu S Hegde and Sanjay Singh∗
August 20, 2013
Abstract
In this paper, we address the problems faced by a group of agents
that possess situational awareness, but lack a security mechanism, by the
introduction of a adaptive risk management system. The Belief-Desire-
Intention (BDI) architecture lacks a framework that would facilitate an
adaptive risk management system that uses the situational awareness of
the agents. We extend the BDI architecture with the concept of adaptive
alertness. Agents can modify their level of alertness by monitoring the
risks faced by them and by their peers. Alert-BDI enables the agents to
detect and assess the risks faced by them in an efficient manner, thereby
increasing operational efficiency and resistance against attacks.
1 Introduction
Autonomous multi-agent systems represent a new approach for the analysis,
design, and implementation of complex software systems [1]. Autonomy, ro-
bustness and distributiveness are the major features of multi-agent systems.
These features makes multi-agent systems an ideal choice for the implemen-
tation of various complex systems. The agent-based systems may be used in
the conceptualization and implementation of many types of software systems.
Multi-agent systems are being used in a variety of fields ranging from network
security to search-and-rescue systems.
In many real world scenarios, multi-agent systems needs to operate without
global knowledge and global communications, that is, the agents operate in the
absence of situational awareness. Global knowledge refers to information that
is available to all agents in the system at any instant of time. However informa-
tion that an agent gains by perceiving its local environment remains localized
unless it is communicated to other agents. Also, in an insecure environment, an
agent would not know whether to believe or not the information it has retrieved
∗Sanjay Singh is with the Department of Information and Communication Tech-
nology, Manipal Institute of Technology, Manipal University, Manipal-576104, INDIA
E-mail: sanjay.singh@manipal.edu
1
arXiv:1308.3874v1[cs.MA]18Aug2013
from a peer agent. Global communications refers to the ability of an agent
to communicate with any peer agents in the system at any instant. However
communications are costly with respect to time and energy. Local information
gained by an agent may have little value to an agent operating at a different
location.
Situational awareness is key to operate securely in an insecure environment.
Awareness may be gained by agents in a multi-agent system through inter-agent
communication as described in [2]. Situational awareness leads to enhanced
operational efficiency of the system. The awareness mechanism enables the
agents to share data by sending and retrieving beliefs. Hegde and Singh [2],
has proposed a mechanism that allows agents to test the relevancy of beliefs, so
that only relevant beliefs would be shared, thereby reducing communications and
hence reducing the communication overheads. Situational awareness empowers
individual agents with the ability to ascertain the credibility of the information
received and the reliability of the agent that supplied it.
In many real world scenarios, multi-agent systems are required to incorporate
security into their operations, for the efficient and successful achievement of their
goals. Incorporating security into agent operations is a drain on the agent’s
resources. However it is vital to the agent’s success, in an insecure environment.
To lessen the impact of security operations on the agent’s resources, the agent
may employ a security mechanism that adapts itself according to the threats
perceived by the agent. Situational awareness may be used to analyze perceived
information to detect and prioritize threats. The agents have to incorporate a
risk management system that analyzes information acquired by the situational
awareness system, detect threats and classify them, and calculate the risk posed
to the agent by these threats. This enables the agent’s security system to change
the intensity of its operations in view of the risks faced by the agent.
To enable the use of autonomous agents in the modeling and design of com-
plex systems, the agents should have the ability to perceive the environment
and directs its activity towards achieving its objectives. Many practical reason-
ing agent models have been proposed in recent years. The BDI model is one
such reasoning agent model that tries to mimic human reasoning using the con-
cepts of beliefs, desires and intentions. A BDI architecture addresses how these
components are represented, updated, and processed to determine the agents
actions [3]. Many agent programming languages and development platforms use
the BDI architecture, such as PRS [4], dMARS [5], AgentSpeak [6], Jason [7],
JADEX [8], GOAL [9], Jack [10] and JAM [11]. However the absence of an
adaptive security mechanism based on situational awareness limits the possibil-
ities of designing efficient multi-agent BDI systems that need to operate in an
insecure environment.
In this paper, we propose an extension to the existing BDI model [12], that
helps the agents analyze the data obtained through situational awareness, and
detect threats to evaluate the risk posed to them by various threats in their
vicinity thereby leading to enhanced operational efficiency as represented in
Fig. 1. This extension will enable the agents:
2
Figure 1: Working of Alert-BDI extension
• To analyze the situational awareness data and identify threats based on
agent behavior. Agent behavior may be the truthfulness or responsiveness
of the agents. Threats may be assigned with priorities based on the risk
posed by them.
• To assess the risks faced, by analyzing the perceived threats and risk
assessments of peer agents. The risk assessments of peer agents are con-
sidered based on agent reputations.
Rest of the paper is organized as follows. Section II briefs the related work in the
area. Section III briefly describes about the existing BDI model and glowworm
swarm optimization. Section IV explains the proposed Alert-BDI and finally
section V concludes this paper.
2 Related Work
The BDI architecture provides an abstract reasoning system that enables the
modeling and implementation of complex systems as an interaction of intelligent
agents using the notion of beliefs, desires and intentions. However, due to the
lack of a complete specification of the BDI architecture, many systems have
been developed that claim to conform to the BDI model, but differ from it in
key aspects. Inverno et al [13] proposed an abstract formal model, dMARS, for
the BDI architecture. It defines the key data structures and operations that
manipulate these structures, to enable the modeling of intelligent agents based
on the BDI model.
3
The belief-desire-intention (BDI) model provides an architecture to enable
the creation of intelligent agents, that can be used to analyze, design and imple-
ment complex systems. Many extensions have been proposed in recent years, to
extend the functionality of the BDI model. These extensions enhance the useful-
ness of the basic BDI model. Panzarasa, Norman and Jennings [14] introduced
the concept of social mental shaping, which extends the BDI model to account
for how common social phenomena can influence an agent’s problem-solving
behavior. It investigates the impact of social nature of agents upon their indi-
vidual mental states. The concept of cooperation among agents is vital to detect
threats in the neighborhood of the agent, in a dynamic environment. But this
system does not explore how the cooperation may be extended to bring about
awareness and security for the agents.
The concept of situational awareness has been introduced Hegde and Singh
[2], which enables agents to share beliefs with their peers in an efficient manner.
The agents share data with a select group of its neighbors, formed using Glow-
worm swarm optimization to optimize the belief sharing mechanism. It proposes
belief agreement and agent reputation algorithms, that use Fleiss’ Kappa [15]
to analyses the veracity of data shared by the peer agents. The agents may use
information gained about the reliability of an agent and its general behavior
to analyses whether an agent is a threat or not. Though this system, analyzes
techniques to detect false communications by agents, it does not make any
attempt to use them to detect threats or analyze the risks faced by individual
agents.
Cooperative multi-agent systems jointly solve tasks through their interac-
tion to maximize utility. Due to the interactions among the agents, multi-agent
problem complexity is directly proportional to the number of agents and agent
behavioral complexity [16]. This requires the the multi-agent systems to opti-
mize their interactions, to enable the agents to operate in an efficient manner.
Lower interactions may result in the agents missing out on vital information.
Higher interaction among the agents increases the complexity of the system,
leading to reduced system efficiency. To solve this problem, we propose the use
of a swarm optimization technique to optimize the risk assessment procedure.
The proposed system uses the concept of situational awareness proposed in
[2], to develop a threat detection and risk assessment mechanism. This would
enable agents to collaborate with their peers to detect anomalous agent behav-
ior. Moreover, the risk assessment mechanism allows the agents to perceive the
risk posed to them, due to the threats detected. The risk assessment technique
is optimized by the use of glowworm swarm optimization [17]. This is crucial
to ensure scalability of the system.
3 Theoretical Background
This section describes the BDI model and Glowworm Swarm Optimization.
4
3.1 The BDI Model
The belief-desire-intention model is a model developed for providing agents with
a reasoning ability. The BDI model implements the principal aspects of Michael
Bratman’s theory of human practical reasoning [18]. The key components of
the BDI model include beliefs, desires and intentions. Beliefs represent the
information available to an agent. The information may include its observations
of the world or communicational data from other agents. Desires represent the
objectives that the agent would like to accomplish. A desire to which an agent
commits itself, forms its intention. Intentions are courses of action that an
agent has committed to carry out [19]. Current intentions were influenced by
the agent’s beliefs and past intentions. Moreover current intentions, constrain
the adoption of new intentions.
3.2 Glowworm Swarm Optimization
Glowworm Swarm Optimization (GSO) is a new swarm intelligence based al-
gorithm for optimizing multi-modal functions. In GSO, the individuals in the
swarm use a dynamic decision domain to effectively locate the local maxima of
the function. Each individual in the swarm uses the decision domain to choose
its neighbors and decides its direction of movement by the strength of the signal
picked up from them. These movements that are based only on local infor-
mation enable the multi-agent swarm to partition into disjoint subgroups that
converge to multiple optima of a given multimodal function [17].
The agents are initially placed randomly in the optimization problem’s search
space. Also, all agents are assigned the same fitness values. Each execution cycle
of the algorithm updates individual fitness values, location and decision domain
attributes. The details of the GSO algorithm can be found in [20]. The GSO
algorithm has been used here to optimize the risk assessment process.
4 Proposed Method
4.1 Overview of Alert-BDI
Alert-BDI is based on the dMARS specification [13] and extends the basic BDI
architecture by enabling the agents to use situational awareness to achieve adap-
tive alertness. Situational awareness can be gained through exchange of beliefs,
belief relevancy, belief agreement and agent reputation [2]. Alertness is the
state of being aware of the occurrences of events, and processing the events to
detect any unusual and potentially dangerous circumstances. It combines in-
formation gathering and analysis of the gathered information to detect threats.
Information gathering is the awareness gained by perceiving the environment
and retrieving data from its peers. Threat detection is based on agent behavior,
that is its interactions with other agents.
Malicious agents are not a threat solely to the agents interacting with it
but also to other agents in the swarm. Thus, there is an inherent need for
5
agents to collaborate and learn from each others experience in dealing with
malicious agents. Jean et al [21] proposed a monitoring system is that allows
agents to learn and classify agents, not only based on their own observations,
but also based on collaboration with other agents in the network. To model the
malicious intent of agents, we propose an anomaly detection model, that takes
into consideration both the responsiveness of an agent and its truthfulness.
Responsiveness is a useful metric, since it helps gauge the willingness of an
agent to cooperate with its peers. Also, the truthfulness of an agent may be
determined to a greater extent if the agent is responsive. Moreover, in a volatile
real-world environment, the validity of truth may change rapidly, and hence the
anomaly detection model should take this into consideration, while classifying
the agents.
4.2 Structural Specification of Alert-BDI
Traditional security techniques can protect agents from certain kinds of attacks.
However the autonomy and distributiveness of multi-agent systems require the
agents to communicate and cooperate among themselves, to tackle the threats
faced by them. T.Y Li and K.Y Lam [22] gave an anomaly detection model for
detecting malicious agents, that analyzes mobile agents activity by measuring
its movement pattern and residence time on hosts. Observation shows that
majority of the agents follow some regular behavior patterns. Hence, anomaly
detection may be used to detect agents behaving in an abnormal manner.
Figure 2: Anomaly Detection Model
The proposed anomaly detection model processes the information gathered
by situationally aware agents. This information may be processed to analyze
6
the perceptions of risk as perceived by peer agents. The information includes
truthfulness and responsiveness of agents. Each individual agent scans its local
environment to identify peer agents and their behavior. The agent may commu-
nicate with its peers over time. These communications are processed to analyze
the truthfulness and responsiveness of agents.
The anomaly detection model includes a Model Generator and an Anomaly
Detector as shown in Fig 2. The model generator receives behavioral data
from peer agents and generates agent models periodically. The anomaly detec-
tor receives processed data from the model generator, its own perceptions and
classifies the threat posed due to other agents.
Each agent may access agent behavioral data from its peers within its com-
munication range. With increase in the size of the swarm, the number of neigh-
bors within the communication range increases and affects the efficiency of risk
assessment. Hence, there is a need to optimize the way agent behavioral data
is accessed, so that the efficiency of risk assessment process is enhanced.
The agents may use glowworm swarm optimization algorithm to identify
agents, whose perceived risks may be considered to model the risk faced by it.
Also, agent behavior may change with changing situations, and hence the risk
assessment algorithm should consider volatile agent behavior while assessing the
risk posed to an agent.
Figure 3: Anomaly Detector
Algorithm to merge agent behavioral data
mergeBehaviourData()
1 /* precondition: received agent behavioral data
2 from a selected group of agents */
3 /* postcondition: assigned behavioral data to
4 individual agents */
7
5 n ← #(Neighbor Agents)
6 for i ← 1 to n
7 do comAgents ← ComDomain(Agent i)
8
9 for i ← 1 to #(comAgents)
10 do for j ← 1 to n
11 do data ← Repute(Agent i) ∗ agentData[i][j]
12 behavior[j] ← behavior[j] + data
4.3 Anomaly Detection
The Anomaly Detection Model (ADM) received agent behavioral data from
individuals in the swarm, and provides them with an estimation of the risks they
are subjected to. The ADM consists of the Model Generator and an Anomaly
Detector. The Model Generator merges agent behavioral data received from
peer agents by assigning weights based on agent reputations.
The Anomaly Detector uses the behavioral data synthesized by the Model
Generator, and estimates the threat category of the agent as represented in Fig
3. The agent behavioral data used by the Anomaly Detector to detect anomalous
behavior includes responsiveness and truthfulness of agents. The responsiveness
factor refers to the willingness of an agent to respond to communications by a
peer agent. An agent that is non responsive is at best a non-cooperative agent.
But it may be a malicious agent as well, and peer agents do not have any
technique to verify its truthfulness. An agent is considered cooperative if it is
both responsive and truthful.
The estimateAgentThreat() algorithm estimates the level of threat posed by
an agent by evaluating its responsiveness and truthfulness. It defines four classes
of threat levels, namely Cooperative, Suspicious, Malicious and Noxious. The
threat level assigned to an agent is volatile, since a change in agent behavior
will affect its threat level. Cooperative agents are friendly and pleasant in their
interaction with their peers. An agent is labeled suspicious, if it is unresponsive
despite being truthful, since its unresponsiveness makes it difficult for its peers
to detect a change in its truthfulness. An agent is said to be malicious if the
agent has been untruthful in the past and its intentions are not clear, due to
its unresponsiveness. A noxious agent is clearly harmful, since it disseminating
false information to its peers.
Algorithm to estimate the threat level of an agent
estimateAgentThreat()
1 /* precondition: received merged responsiveness
2 and truthfulness data of agents */
3 /* postcondition: assigned threat level to
4 individual agents */
5 n ← #(Neighbor Agents)
6 for i ← 1 to n
8
7 do if responsive[i] > respondThreshold
8 then
9 if truthful[i] > truthThreshold
10 then
11 classify agent as Cooperative
12 else
13 classify agent as Noxious
14 else
15 if truthful[i] < truthThreshold
16 then
17 classify agent as Malicious
18 else
19 classify agent as Suspicious
20
4.4 Risk Assessment
Alert-BDI uses the GSO algorithm, to optimize the way agent behavioral data
is retrieved from peer agents, so that the efficiency of risk assessment process is
enhanced. The GSO algorithm is used to select a communication domain, and
optimize communication domain members based on agent truthfulness. The
agents in the system, will identify a group of agents among their neighbors, who
will be contacted to retrieve agent behavioral data, to ensure efficiency.
The fitness of each agent will be based on its probability of being truthful in
its communications. If an agent responds to communication from its neighbors
and its peers validate its response as being truthful, it is more likely to be
included in the communication groups of other agents. The fitness updation
function that decides the value of agent i is given by [17]:
Gi(t) = (1 − ρ)Gi(t − 1) + γJi(t) (1)
where, Gi(t) is new amount of luciferin, Gi(t − 1) is former amount of luciferin
and Ji(t) is fitness of agent i in iteration t of the algorithm and ρ and γ are
constants for modeling luciferin gradual drop and the effect of fitness on luciferin.
Ji(t) is the degree of truthfulness shown by agent i to its neighbors.
For every agent i, the probability of moving into neighboring agent j’s com-
munication domain is defined as,
Pij(t) =
Gj(t) − Gi(t)
k∈Ni(t) Gk(t) − Gi(t)
(2)
where Ni(t) is defined as,
Ni(t) = {j : dij < ri
d(t); Gi(t) < Gj(t)} and j ∈ Ni(t) (3)
where dij is the distance between agents i and j.
9
Each agent i maintains communications with a select group of its neighbors;
the communication domain Ni(t) of agent i consists of those agents that have
a relatively higher fitness value and that are located within a dynamic decision
domain whose range, ri
d(t), is bounded by a circular sensor range
(0 < ri
d(t) ≤ rs). The decision domain range for each agent i is updated using
the expression,
ri
d(t + 1) = min{rs, max{0, ri
d(t) + β(nt − |Ni(t)|)}} (4)
where, β is a constant parameter and nt is a parameter to control the number
of agents in the decision domain.
Algorithm to determine Communication domain
comDomain(agent j)
1 /* precondition: agent j is in the neighborhood of
2 the agent */
3 /* postcondition: agent j is included or excluded from
4 the communication domain */
5 agent i ← agent executing comDomain()
6 /* Luciferin updating phase */
7 Gi(t) = (1 − ρ)Gi(t − 1) + γJi(t)
8 /* Communication Domain updating phase */
9 /* Determining probability of agent j being included in
10 the Communication domain */
11 Pij(t) ←
Gj (t)−Gi(t)
k∈Ni(t) Gk(t)−Gi(t)
12 Ni(t) ← j : dij < ri
d(t); Gi(t) < Gj(t)
13 maxAgents ← s
14 while #(Ni(t)) > s
15 do
16 for k ← 1 to #(Ni(t))
17 do
18 rAgent ← agent k with leastVal(Pij(t))
19 remove agent rAgent from Ni(t)
20 /* updating range of Communication Domain */
21 ri
d(t + 1) ← min{rs, max{0, ri
d(t) + β(nt − |Ni(t)|)}}
The communication domain of an agent is the subset of the agent’s neigh-
bors from whom the agent would retrieve agent behavioral data. The comDo-
main() algorithm is based on the GSO algorithm. It consists of three phases,
namely luciferin updation phase, communication domain updation phase and
the communication domain range updation phase. The luciferin updation phase
is concerned with updating the fitness of the agent based on past and current
fitness values.
In the communication domain updation phase the agent first determines the
probability of agent j being included in its communication domain. This is
calculated based on the luciferin values of agents i and j and that of the agents
10
in i’s communication domain. Then the communication domain is updated
based on the communication domain range of agent i and the luciferin values of
agents i and j. If the number of agents in its communication domain exceeds a
predefined limit, it discards a member agent that has the lowest probability of
inclusion.
In the communication domain range updation phase, the agent updates the
range of its communication domain based on its sensor range, past value of its
communication domain range and the current size of its communication domain.
5 Conclusion
In the basic BDI model, agents can exchange beliefs by sending messages to
peer agents. However, the absence of a mechanism that enables a multi-agent
system to detect threats and assess risks in an efficient and cooperative manner,
makes them vulnerable to attacks.
In this paper, we propose an extension to the basic BDI model that would
enable agents to achieve adaptive alertness using situational awareness. Achiev-
ing adaptive alertness that adapts to changing conditions in the environment,
enables the agents to employ a security mechanism that can vary to suit the
risk faced. Such a variable security mechanism saves the agent’s resources for
the fulfillment of their goals.
Adaptive alertness achieves the task of threat detection and risk assessment
by gaining information through situational awareness among the agents. The
agents may communicate with their peers to evaluate agent’s behavior in a col-
laborated effort. Moreover, the use of glowworm swarm optimization to optimize
the risk assessment process enhances the scalability of the overall system.
References
[1] N. R. Jennings, K. Sycara, and M. Wooldridge, “A roadmap of
agent research and development,” Autonomous Agents and Multi-Agent
Systems, vol. 1, no. 1, pp. 7–38, Jan. 1998. [Online]. Available:
http://dx.doi.org/10.1023/A:1010090405266
[2] M. S. Hegde and S. Singh, “Aware-BDI: An extension of BDI model in-
corporating situational awareness,” in Third International Conference on
Communication Systems and Network Technologies 2013 (CSNT 2013),
Gwalior, India, April 2013, pp. 100–104.
[3] S. Sardina and L. Padgham, “A bdi agent programming language with
failure handling, declarative goals, and planning,” Autonomous Agents
and Multi-Agent Systems, vol. 23, no. 1, pp. 18–70, Jul. 2011. [Online].
Available: http://dx.doi.org/10.1007/s10458-010-9130-9
[4] F. Ingrand, M. Georgeff, and A. Rao, “An architecture for real-time rea-
soning and system control,” IEEE Expert, vol. 7, no. 6, pp. 34–44, Dec.
11
[5] M. D’Inverno, M. Luck, M. Georgeff, D. Kinny, and M. Wooldridge, “The
dmars architecture: A specification of the distributed multi-agent reasoning
system,” Autonomous Agents and Multi-Agent Systems, vol. 9, no. 1-2,
pp. 5–53, Jul. 2004. [Online]. Available: http://dx.doi.org/10.1023/B:
AGNT.0000019688.11109.19
[6] D. Silva and J. Gluz, “Agentspeak(pl): A new programming language for
bdi agents with integrated bayesian network model,” in Information Sci-
ence and Applications (ICISA), 2011 International Conference on, April,
pp. 1–7.
[7] S. Vester, N. Boss, A. Jensen, and J. Villadsen, “Improving multi-
agent systems using jason,” Annals of Mathematics and Artificial
Intelligence, vol. 61, pp. 297–307, 2011. [Online]. Available: http:
//dx.doi.org/10.1007/s10472-011-9225-2
[8] L. Braubach, A. Pokahr, and W. Lamersdorf, “Jadex: A bdi-agent
system combining middleware and reasoning,” in Software Agent-
Based Applications, Platforms and Development Kits, ser. Whitestein
Series in Software Agent Technologies, R. Unland, M. Calisti, and
M. Klusch, Eds. Birkhuser Basel, 2005, pp. 143–168. [Online]. Available:
http://dx.doi.org/10.1007/3-7643-7348-2 7
[9] K. Hindriks, “A verification logic for goal agents,” in Specification and
Verification of Multi-agent Systems, M. Dastani, K. V. Hindriks, and
J.-J. C. Meyer, Eds. Springer US, 2010, pp. 225–254. [Online]. Available:
http://dx.doi.org/10.1007/978--1--4419--6984--2 8
[10] M. Winikoff, “Jack intelligent agents: An industrial strength platform,”
in Multi-Agent Programming, ser. Multiagent Systems, Artificial Societies,
and Simulated Organizations, R. Bordini, M. Dastani, J. Dix, and
A. Fallah Seghrouchni, Eds. Springer US, 2005, vol. 15, pp. 175–193.
[Online]. Available: http://dx.doi.org/10.1007/0--387--26350--0 7
[11] M. J. Huber, “Jam: a bdi-theoretic mobile agent architecture,” in
Proceedings of the third annual conference on Autonomous Agents, ser.
AGENTS ’99. New York, NY, USA: ACM, 1999, pp. 236–243. [Online].
Available: http://doi.acm.org/10.1145/301136.301202
[12] M. Bratman, Intention, Plans, and Practical Reason. Center for the Study
of Language and Information, May 1999.
[13] M. d’Inverno, D. Kinny, M. Luck, and M. Wooldridge, “A formal
specification of dmars,” in Proceedings of the 4th International Workshop
on Intelligent Agents IV, Agent Theories, Architectures, and Languages,
ser. ATAL ’97. London, UK, UK: Springer-Verlag, 1998, pp. 155–176.
[Online]. Available: http://dl.acm.org/citation.cfm?id=648204.749438
12
[14] P. Panzarasa, T. J. Norman, and N. R. Jennings, “Modeling sociality in
the bdi framework,” in In Proceedings of First Asia-Pacific Conference on
Intelligent Agent Technology (IAT’99, 1999, pp. 202–206.
[15] Wikipedia. (2013) Fleiss’ kappa. [Online]. Available: http://en.wikipedia.
org/wiki/Fleiss%27 kappa
[16] L. Panait and S. Luke, “Cooperative multi-agent learning: The
state of the art,” Autonomous Agents and Multi-Agent Systems,
vol. 11, no. 3, pp. 387–434, Nov. 2005. [Online]. Available: http:
//dx.doi.org/10.1007/s10458-005-2631-2
[17] K. N. Krishnanand and D. Ghose, “Glowworm swarm optimisation a
new method for optimising multimodal functions,” Int. J. Comput.
Intell. Stud., vol. 1, no. 1, pp. 93–119, May 2009. [Online]. Available:
http://dx.doi.org/10.1504/IJCISTUDIES.2009.025340
[18] “Belief-desire-intention software model,” [Available Online]
http://en.wikipedia.org/wiki/Belief-desire-intention software model,
2012.
[19] A. Guerra-Hern´andez, A. El Fallah-Seghrouchni, and H. Soldano, “Learn-
ing in BDI multi-agent systems,” in Proceedings of the 4th international
conference on Computational Logic in Multi-Agent Systems, ser. CLIMA
IV’04. Berlin, Heidelberg: Springer-Verlag, 2004, pp. 218–233.
[20] B. Iranpour and M. Meybodi, “An improved fuzzy based glowworm
algorithm,” International Journal of Engineering and Technology,
vol. 2, no. 5, pp. 900–905, May 2012. [Online]. Available: http:
//iet-journals.org/archive/2012/may vol 2 no 5/3891133114277.pdf
[21] E. Jean, Y. Jiao, A. R. Hurson, and T. E. Potok, “Boosting-
based distributed and adaptive security-monitoring through agent
collaboration,” in Proceedings of the 2007 IEEE/WIC/ACM International
Conferences on Web Intelligence and Intelligent Agent Technology
- Workshops, ser. WI-IATW ’07. Washington, DC, USA: IEEE
Computer Society, 2007, pp. 516–520. [Online]. Available: http:
//dl.acm.org/citation.cfm?id=1339264.1339633
[22] T.-Y. Li and K.-Y. Lam, “Detecting anomalous agents in mobile agent
system: a preliminary approach,” in Proceedings of the first international
joint conference on Autonomous agents and multiagent systems: part
2, ser. AAMAS ’02. New York, NY, USA: ACM, 2002, pp. 655–656.
[Online]. Available: http://doi.acm.org/10.1145/544862.544894
13

More Related Content

What's hot

Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios ijcsa
 
10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and ReponseEMC
 
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTS
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTSTRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTS
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTSijp2p
 
Paper id 212014100
Paper id 212014100Paper id 212014100
Paper id 212014100IJRAT
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesIJRES Journal
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analyticsIJNSA Journal
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSIJNSA Journal
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...IJNSA Journal
 
Intrusion detection system via fuzzy
Intrusion detection system via fuzzyIntrusion detection system via fuzzy
Intrusion detection system via fuzzyIJDKP
 
Software reusabilitydevelopment through NFL approach For identifying security...
Software reusabilitydevelopment through NFL approach For identifying security...Software reusabilitydevelopment through NFL approach For identifying security...
Software reusabilitydevelopment through NFL approach For identifying security...IJECEIAES
 
Risk Analysis On It Assets Using Case Based Reasoning
Risk Analysis On It Assets Using Case Based ReasoningRisk Analysis On It Assets Using Case Based Reasoning
Risk Analysis On It Assets Using Case Based ReasoningAfeef Veetil
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...Spark Security
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...IJNSA Journal
 
Managing Intrusion Detection Alerts Using Support Vector Machines
Managing Intrusion Detection Alerts Using Support Vector MachinesManaging Intrusion Detection Alerts Using Support Vector Machines
Managing Intrusion Detection Alerts Using Support Vector MachinesCSCJournals
 
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...IOSR Journals
 

What's hot (19)

A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...
 
Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios
 
E1802052327
E1802052327E1802052327
E1802052327
 
10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse
 
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTS
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTSTRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTS
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTS
 
Paper id 212014100
Paper id 212014100Paper id 212014100
Paper id 212014100
 
J1802056063
J1802056063J1802056063
J1802056063
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analytics
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
 
Intrusion detection system via fuzzy
Intrusion detection system via fuzzyIntrusion detection system via fuzzy
Intrusion detection system via fuzzy
 
Swarm ai
Swarm aiSwarm ai
Swarm ai
 
Software reusabilitydevelopment through NFL approach For identifying security...
Software reusabilitydevelopment through NFL approach For identifying security...Software reusabilitydevelopment through NFL approach For identifying security...
Software reusabilitydevelopment through NFL approach For identifying security...
 
Risk Analysis On It Assets Using Case Based Reasoning
Risk Analysis On It Assets Using Case Based ReasoningRisk Analysis On It Assets Using Case Based Reasoning
Risk Analysis On It Assets Using Case Based Reasoning
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
 
Managing Intrusion Detection Alerts Using Support Vector Machines
Managing Intrusion Detection Alerts Using Support Vector MachinesManaging Intrusion Detection Alerts Using Support Vector Machines
Managing Intrusion Detection Alerts Using Support Vector Machines
 
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
 

Viewers also liked

Neuroscience, mental privacy and the law
Neuroscience, mental privacy and the lawNeuroscience, mental privacy and the law
Neuroscience, mental privacy and the lawKarlos Svoboda
 
9 A Century of Crisis
9 A Century of Crisis9 A Century of Crisis
9 A Century of Crisismvastola
 
The next step privacy invasions by biometrics
The next step   privacy invasions by biometricsThe next step   privacy invasions by biometrics
The next step privacy invasions by biometricsKarlos Svoboda
 
Guidelines for Examination of Computer Related Inventions (CRIs)
Guidelines for Examination of  Computer Related  Inventions (CRIs)   Guidelines for Examination of  Computer Related  Inventions (CRIs)
Guidelines for Examination of Computer Related Inventions (CRIs) Karlos Svoboda
 
Manual on the effective investigation and documentation of torture
Manual on the effective investigation and documentation of tortureManual on the effective investigation and documentation of torture
Manual on the effective investigation and documentation of tortureKarlos Svoboda
 
Emerging Technoethics of Human Interaction with Communication, Bionic and Rob...
Emerging Technoethics of Human Interaction with Communication, Bionic and Rob...Emerging Technoethics of Human Interaction with Communication, Bionic and Rob...
Emerging Technoethics of Human Interaction with Communication, Bionic and Rob...Karlos Svoboda
 
TORTTURE AND INHUMAN ACTS IN NIGERIA, WHATS NIGERIA GOVERNMENT DO WITH HUMAN ...
TORTTURE AND INHUMAN ACTS IN NIGERIA, WHATS NIGERIA GOVERNMENT DO WITH HUMAN ...TORTTURE AND INHUMAN ACTS IN NIGERIA, WHATS NIGERIA GOVERNMENT DO WITH HUMAN ...
TORTTURE AND INHUMAN ACTS IN NIGERIA, WHATS NIGERIA GOVERNMENT DO WITH HUMAN ...Lynn University
 
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...Karlos Svoboda
 

Viewers also liked (9)

Neuroscience, mental privacy and the law
Neuroscience, mental privacy and the lawNeuroscience, mental privacy and the law
Neuroscience, mental privacy and the law
 
Bakalarka final
Bakalarka finalBakalarka final
Bakalarka final
 
9 A Century of Crisis
9 A Century of Crisis9 A Century of Crisis
9 A Century of Crisis
 
The next step privacy invasions by biometrics
The next step   privacy invasions by biometricsThe next step   privacy invasions by biometrics
The next step privacy invasions by biometrics
 
Guidelines for Examination of Computer Related Inventions (CRIs)
Guidelines for Examination of  Computer Related  Inventions (CRIs)   Guidelines for Examination of  Computer Related  Inventions (CRIs)
Guidelines for Examination of Computer Related Inventions (CRIs)
 
Manual on the effective investigation and documentation of torture
Manual on the effective investigation and documentation of tortureManual on the effective investigation and documentation of torture
Manual on the effective investigation and documentation of torture
 
Emerging Technoethics of Human Interaction with Communication, Bionic and Rob...
Emerging Technoethics of Human Interaction with Communication, Bionic and Rob...Emerging Technoethics of Human Interaction with Communication, Bionic and Rob...
Emerging Technoethics of Human Interaction with Communication, Bionic and Rob...
 
TORTTURE AND INHUMAN ACTS IN NIGERIA, WHATS NIGERIA GOVERNMENT DO WITH HUMAN ...
TORTTURE AND INHUMAN ACTS IN NIGERIA, WHATS NIGERIA GOVERNMENT DO WITH HUMAN ...TORTTURE AND INHUMAN ACTS IN NIGERIA, WHATS NIGERIA GOVERNMENT DO WITH HUMAN ...
TORTTURE AND INHUMAN ACTS IN NIGERIA, WHATS NIGERIA GOVERNMENT DO WITH HUMAN ...
 
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
 

Similar to BDI Model with Adaptive Alertness through Situational Awareness

journalism research
journalism researchjournalism research
journalism researchrikaseorika
 
journalism research
journalism researchjournalism research
journalism researchrikaseorika
 
Requirement analysis, architectural design and formal verification of a multi...
Requirement analysis, architectural design and formal verification of a multi...Requirement analysis, architectural design and formal verification of a multi...
Requirement analysis, architectural design and formal verification of a multi...ijcsit
 
Improving the quality of information in strategic scanning system network app...
Improving the quality of information in strategic scanning system network app...Improving the quality of information in strategic scanning system network app...
Improving the quality of information in strategic scanning system network app...ijaia
 
Enterprise Risk Management-Paper
Enterprise Risk Management-PaperEnterprise Risk Management-Paper
Enterprise Risk Management-PaperPierre Samson
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET Journal
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follAISHA232980
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...IJECEIAES
 
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTUREA USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTUREIJCNC
 
Integrating Threat Modeling in Secure Agent-Oriented Software Development
Integrating Threat Modeling in Secure Agent-Oriented Software DevelopmentIntegrating Threat Modeling in Secure Agent-Oriented Software Development
Integrating Threat Modeling in Secure Agent-Oriented Software DevelopmentWaqas Tariq
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesIJNSA Journal
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Leslie McFarlin
 
An Extended Reasoning Cycle Algorithm for BDI Agents
An Extended Reasoning Cycle Algorithm for BDI AgentsAn Extended Reasoning Cycle Algorithm for BDI Agents
An Extended Reasoning Cycle Algorithm for BDI Agentspaperpublications3
 
An Extended Reasoning Cycle Algorithm for BDI Agents
An Extended Reasoning Cycle Algorithm for BDI AgentsAn Extended Reasoning Cycle Algorithm for BDI Agents
An Extended Reasoning Cycle Algorithm for BDI Agentspaperpublications3
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 

Similar to BDI Model with Adaptive Alertness through Situational Awareness (20)

journalism research
journalism researchjournalism research
journalism research
 
journalism research
journalism researchjournalism research
journalism research
 
Requirement analysis, architectural design and formal verification of a multi...
Requirement analysis, architectural design and formal verification of a multi...Requirement analysis, architectural design and formal verification of a multi...
Requirement analysis, architectural design and formal verification of a multi...
 
Improving the quality of information in strategic scanning system network app...
Improving the quality of information in strategic scanning system network app...Improving the quality of information in strategic scanning system network app...
Improving the quality of information in strategic scanning system network app...
 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptx
 
Gs3112881292
Gs3112881292Gs3112881292
Gs3112881292
 
Dj24712716
Dj24712716Dj24712716
Dj24712716
 
Ao03302460251
Ao03302460251Ao03302460251
Ao03302460251
 
Enterprise Risk Management-Paper
Enterprise Risk Management-PaperEnterprise Risk Management-Paper
Enterprise Risk Management-Paper
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
 
Ap03402460251
Ap03402460251Ap03402460251
Ap03402460251
 
Optimizing cybersecurity incident response decisions using deep reinforcemen...
Optimizing cybersecurity incident response decisions using deep  reinforcemen...Optimizing cybersecurity incident response decisions using deep  reinforcemen...
Optimizing cybersecurity incident response decisions using deep reinforcemen...
 
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTUREA USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
 
Integrating Threat Modeling in Secure Agent-Oriented Software Development
Integrating Threat Modeling in Secure Agent-Oriented Software DevelopmentIntegrating Threat Modeling in Secure Agent-Oriented Software Development
Integrating Threat Modeling in Secure Agent-Oriented Software Development
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
An Extended Reasoning Cycle Algorithm for BDI Agents
An Extended Reasoning Cycle Algorithm for BDI AgentsAn Extended Reasoning Cycle Algorithm for BDI Agents
An Extended Reasoning Cycle Algorithm for BDI Agents
 
An Extended Reasoning Cycle Algorithm for BDI Agents
An Extended Reasoning Cycle Algorithm for BDI AgentsAn Extended Reasoning Cycle Algorithm for BDI Agents
An Extended Reasoning Cycle Algorithm for BDI Agents
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 

More from Karlos Svoboda

Human vs and part machine - TVP magazine
Human vs and part machine - TVP magazineHuman vs and part machine - TVP magazine
Human vs and part machine - TVP magazineKarlos Svoboda
 
Moral science - Human subjects
Moral science - Human subjectsMoral science - Human subjects
Moral science - Human subjectsKarlos Svoboda
 
Existential Risk Prevention as Global Priority
Existential Risk Prevention as Global PriorityExistential Risk Prevention as Global Priority
Existential Risk Prevention as Global PriorityKarlos Svoboda
 
A taxonomy for descriptive research in law and technology
A taxonomy for descriptive research in law and technologyA taxonomy for descriptive research in law and technology
A taxonomy for descriptive research in law and technologyKarlos Svoboda
 
Brain computer interaction and medical access to the brain
Brain computer interaction and medical access to the brainBrain computer interaction and medical access to the brain
Brain computer interaction and medical access to the brainKarlos Svoboda
 
A rights based model of governance - the case of human enhancement
A rights based model of governance - the case of human enhancementA rights based model of governance - the case of human enhancement
A rights based model of governance - the case of human enhancementKarlos Svoboda
 
Evropská dohoda o ochraně obratlovců
Evropská dohoda o ochraně obratlovcůEvropská dohoda o ochraně obratlovců
Evropská dohoda o ochraně obratlovcůKarlos Svoboda
 
Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28Karlos Svoboda
 
Ethical aspect of ICT Implants in the Human body
Ethical aspect of ICT Implants in the Human bodyEthical aspect of ICT Implants in the Human body
Ethical aspect of ICT Implants in the Human bodyKarlos Svoboda
 
Neural devices will change humankind
Neural devices will change humankindNeural devices will change humankind
Neural devices will change humankindKarlos Svoboda
 
Nanotechnology, ubiquitous computing and the internet of things
Nanotechnology, ubiquitous computing and the internet of thingsNanotechnology, ubiquitous computing and the internet of things
Nanotechnology, ubiquitous computing and the internet of thingsKarlos Svoboda
 
Identity REvolution multi disciplinary perspectives
Identity REvolution   multi disciplinary perspectivesIdentity REvolution   multi disciplinary perspectives
Identity REvolution multi disciplinary perspectivesKarlos Svoboda
 
MBAN medical body area network - first report and order
MBAN   medical body area network - first report and orderMBAN   medical body area network - first report and order
MBAN medical body area network - first report and orderKarlos Svoboda
 
Intimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviourIntimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviourKarlos Svoboda
 
Making perfect life european governance challenges in 21st Century Bio-engine...
Making perfect life european governance challenges in 21st Century Bio-engine...Making perfect life european governance challenges in 21st Century Bio-engine...
Making perfect life european governance challenges in 21st Century Bio-engine...Karlos Svoboda
 
GRAY MATTERS Integrative Approaches for Neuroscience, Ethics, and Society
GRAY MATTERS Integrative Approaches for  Neuroscience, Ethics, and SocietyGRAY MATTERS Integrative Approaches for  Neuroscience, Ethics, and Society
GRAY MATTERS Integrative Approaches for Neuroscience, Ethics, and SocietyKarlos Svoboda
 
Biotechnology and science probing the mind
Biotechnology and science   probing the mindBiotechnology and science   probing the mind
Biotechnology and science probing the mindKarlos Svoboda
 

More from Karlos Svoboda (20)

Human vs and part machine - TVP magazine
Human vs and part machine - TVP magazineHuman vs and part machine - TVP magazine
Human vs and part machine - TVP magazine
 
Jan Hus De ecclesia
Jan Hus De ecclesia Jan Hus De ecclesia
Jan Hus De ecclesia
 
Moral science - Human subjects
Moral science - Human subjectsMoral science - Human subjects
Moral science - Human subjects
 
Existential Risk Prevention as Global Priority
Existential Risk Prevention as Global PriorityExistential Risk Prevention as Global Priority
Existential Risk Prevention as Global Priority
 
A taxonomy for descriptive research in law and technology
A taxonomy for descriptive research in law and technologyA taxonomy for descriptive research in law and technology
A taxonomy for descriptive research in law and technology
 
Brain computer interaction and medical access to the brain
Brain computer interaction and medical access to the brainBrain computer interaction and medical access to the brain
Brain computer interaction and medical access to the brain
 
A rights based model of governance - the case of human enhancement
A rights based model of governance - the case of human enhancementA rights based model of governance - the case of human enhancement
A rights based model of governance - the case of human enhancement
 
Evropská dohoda o ochraně obratlovců
Evropská dohoda o ochraně obratlovcůEvropská dohoda o ochraně obratlovců
Evropská dohoda o ochraně obratlovců
 
Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28Ethics of security and surveillance technologies opinion 28
Ethics of security and surveillance technologies opinion 28
 
Ethical aspect of ICT Implants in the Human body
Ethical aspect of ICT Implants in the Human bodyEthical aspect of ICT Implants in the Human body
Ethical aspect of ICT Implants in the Human body
 
Neural devices will change humankind
Neural devices will change humankindNeural devices will change humankind
Neural devices will change humankind
 
Nanotechnology, ubiquitous computing and the internet of things
Nanotechnology, ubiquitous computing and the internet of thingsNanotechnology, ubiquitous computing and the internet of things
Nanotechnology, ubiquitous computing and the internet of things
 
Identity REvolution multi disciplinary perspectives
Identity REvolution   multi disciplinary perspectivesIdentity REvolution   multi disciplinary perspectives
Identity REvolution multi disciplinary perspectives
 
MBAN medical body area network - first report and order
MBAN   medical body area network - first report and orderMBAN   medical body area network - first report and order
MBAN medical body area network - first report and order
 
Intimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviourIntimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviour
 
Human enhancement
Human enhancementHuman enhancement
Human enhancement
 
Making perfect life european governance challenges in 21st Century Bio-engine...
Making perfect life european governance challenges in 21st Century Bio-engine...Making perfect life european governance challenges in 21st Century Bio-engine...
Making perfect life european governance challenges in 21st Century Bio-engine...
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
GRAY MATTERS Integrative Approaches for Neuroscience, Ethics, and Society
GRAY MATTERS Integrative Approaches for  Neuroscience, Ethics, and SocietyGRAY MATTERS Integrative Approaches for  Neuroscience, Ethics, and Society
GRAY MATTERS Integrative Approaches for Neuroscience, Ethics, and Society
 
Biotechnology and science probing the mind
Biotechnology and science   probing the mindBiotechnology and science   probing the mind
Biotechnology and science probing the mind
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

BDI Model with Adaptive Alertness through Situational Awareness

  • 1. Alert-BDI: BDI Model with Adaptive Alertness through Situational Awareness Manu S Hegde and Sanjay Singh∗ August 20, 2013 Abstract In this paper, we address the problems faced by a group of agents that possess situational awareness, but lack a security mechanism, by the introduction of a adaptive risk management system. The Belief-Desire- Intention (BDI) architecture lacks a framework that would facilitate an adaptive risk management system that uses the situational awareness of the agents. We extend the BDI architecture with the concept of adaptive alertness. Agents can modify their level of alertness by monitoring the risks faced by them and by their peers. Alert-BDI enables the agents to detect and assess the risks faced by them in an efficient manner, thereby increasing operational efficiency and resistance against attacks. 1 Introduction Autonomous multi-agent systems represent a new approach for the analysis, design, and implementation of complex software systems [1]. Autonomy, ro- bustness and distributiveness are the major features of multi-agent systems. These features makes multi-agent systems an ideal choice for the implemen- tation of various complex systems. The agent-based systems may be used in the conceptualization and implementation of many types of software systems. Multi-agent systems are being used in a variety of fields ranging from network security to search-and-rescue systems. In many real world scenarios, multi-agent systems needs to operate without global knowledge and global communications, that is, the agents operate in the absence of situational awareness. Global knowledge refers to information that is available to all agents in the system at any instant of time. However informa- tion that an agent gains by perceiving its local environment remains localized unless it is communicated to other agents. Also, in an insecure environment, an agent would not know whether to believe or not the information it has retrieved ∗Sanjay Singh is with the Department of Information and Communication Tech- nology, Manipal Institute of Technology, Manipal University, Manipal-576104, INDIA E-mail: sanjay.singh@manipal.edu 1 arXiv:1308.3874v1[cs.MA]18Aug2013
  • 2. from a peer agent. Global communications refers to the ability of an agent to communicate with any peer agents in the system at any instant. However communications are costly with respect to time and energy. Local information gained by an agent may have little value to an agent operating at a different location. Situational awareness is key to operate securely in an insecure environment. Awareness may be gained by agents in a multi-agent system through inter-agent communication as described in [2]. Situational awareness leads to enhanced operational efficiency of the system. The awareness mechanism enables the agents to share data by sending and retrieving beliefs. Hegde and Singh [2], has proposed a mechanism that allows agents to test the relevancy of beliefs, so that only relevant beliefs would be shared, thereby reducing communications and hence reducing the communication overheads. Situational awareness empowers individual agents with the ability to ascertain the credibility of the information received and the reliability of the agent that supplied it. In many real world scenarios, multi-agent systems are required to incorporate security into their operations, for the efficient and successful achievement of their goals. Incorporating security into agent operations is a drain on the agent’s resources. However it is vital to the agent’s success, in an insecure environment. To lessen the impact of security operations on the agent’s resources, the agent may employ a security mechanism that adapts itself according to the threats perceived by the agent. Situational awareness may be used to analyze perceived information to detect and prioritize threats. The agents have to incorporate a risk management system that analyzes information acquired by the situational awareness system, detect threats and classify them, and calculate the risk posed to the agent by these threats. This enables the agent’s security system to change the intensity of its operations in view of the risks faced by the agent. To enable the use of autonomous agents in the modeling and design of com- plex systems, the agents should have the ability to perceive the environment and directs its activity towards achieving its objectives. Many practical reason- ing agent models have been proposed in recent years. The BDI model is one such reasoning agent model that tries to mimic human reasoning using the con- cepts of beliefs, desires and intentions. A BDI architecture addresses how these components are represented, updated, and processed to determine the agents actions [3]. Many agent programming languages and development platforms use the BDI architecture, such as PRS [4], dMARS [5], AgentSpeak [6], Jason [7], JADEX [8], GOAL [9], Jack [10] and JAM [11]. However the absence of an adaptive security mechanism based on situational awareness limits the possibil- ities of designing efficient multi-agent BDI systems that need to operate in an insecure environment. In this paper, we propose an extension to the existing BDI model [12], that helps the agents analyze the data obtained through situational awareness, and detect threats to evaluate the risk posed to them by various threats in their vicinity thereby leading to enhanced operational efficiency as represented in Fig. 1. This extension will enable the agents: 2
  • 3. Figure 1: Working of Alert-BDI extension • To analyze the situational awareness data and identify threats based on agent behavior. Agent behavior may be the truthfulness or responsiveness of the agents. Threats may be assigned with priorities based on the risk posed by them. • To assess the risks faced, by analyzing the perceived threats and risk assessments of peer agents. The risk assessments of peer agents are con- sidered based on agent reputations. Rest of the paper is organized as follows. Section II briefs the related work in the area. Section III briefly describes about the existing BDI model and glowworm swarm optimization. Section IV explains the proposed Alert-BDI and finally section V concludes this paper. 2 Related Work The BDI architecture provides an abstract reasoning system that enables the modeling and implementation of complex systems as an interaction of intelligent agents using the notion of beliefs, desires and intentions. However, due to the lack of a complete specification of the BDI architecture, many systems have been developed that claim to conform to the BDI model, but differ from it in key aspects. Inverno et al [13] proposed an abstract formal model, dMARS, for the BDI architecture. It defines the key data structures and operations that manipulate these structures, to enable the modeling of intelligent agents based on the BDI model. 3
  • 4. The belief-desire-intention (BDI) model provides an architecture to enable the creation of intelligent agents, that can be used to analyze, design and imple- ment complex systems. Many extensions have been proposed in recent years, to extend the functionality of the BDI model. These extensions enhance the useful- ness of the basic BDI model. Panzarasa, Norman and Jennings [14] introduced the concept of social mental shaping, which extends the BDI model to account for how common social phenomena can influence an agent’s problem-solving behavior. It investigates the impact of social nature of agents upon their indi- vidual mental states. The concept of cooperation among agents is vital to detect threats in the neighborhood of the agent, in a dynamic environment. But this system does not explore how the cooperation may be extended to bring about awareness and security for the agents. The concept of situational awareness has been introduced Hegde and Singh [2], which enables agents to share beliefs with their peers in an efficient manner. The agents share data with a select group of its neighbors, formed using Glow- worm swarm optimization to optimize the belief sharing mechanism. It proposes belief agreement and agent reputation algorithms, that use Fleiss’ Kappa [15] to analyses the veracity of data shared by the peer agents. The agents may use information gained about the reliability of an agent and its general behavior to analyses whether an agent is a threat or not. Though this system, analyzes techniques to detect false communications by agents, it does not make any attempt to use them to detect threats or analyze the risks faced by individual agents. Cooperative multi-agent systems jointly solve tasks through their interac- tion to maximize utility. Due to the interactions among the agents, multi-agent problem complexity is directly proportional to the number of agents and agent behavioral complexity [16]. This requires the the multi-agent systems to opti- mize their interactions, to enable the agents to operate in an efficient manner. Lower interactions may result in the agents missing out on vital information. Higher interaction among the agents increases the complexity of the system, leading to reduced system efficiency. To solve this problem, we propose the use of a swarm optimization technique to optimize the risk assessment procedure. The proposed system uses the concept of situational awareness proposed in [2], to develop a threat detection and risk assessment mechanism. This would enable agents to collaborate with their peers to detect anomalous agent behav- ior. Moreover, the risk assessment mechanism allows the agents to perceive the risk posed to them, due to the threats detected. The risk assessment technique is optimized by the use of glowworm swarm optimization [17]. This is crucial to ensure scalability of the system. 3 Theoretical Background This section describes the BDI model and Glowworm Swarm Optimization. 4
  • 5. 3.1 The BDI Model The belief-desire-intention model is a model developed for providing agents with a reasoning ability. The BDI model implements the principal aspects of Michael Bratman’s theory of human practical reasoning [18]. The key components of the BDI model include beliefs, desires and intentions. Beliefs represent the information available to an agent. The information may include its observations of the world or communicational data from other agents. Desires represent the objectives that the agent would like to accomplish. A desire to which an agent commits itself, forms its intention. Intentions are courses of action that an agent has committed to carry out [19]. Current intentions were influenced by the agent’s beliefs and past intentions. Moreover current intentions, constrain the adoption of new intentions. 3.2 Glowworm Swarm Optimization Glowworm Swarm Optimization (GSO) is a new swarm intelligence based al- gorithm for optimizing multi-modal functions. In GSO, the individuals in the swarm use a dynamic decision domain to effectively locate the local maxima of the function. Each individual in the swarm uses the decision domain to choose its neighbors and decides its direction of movement by the strength of the signal picked up from them. These movements that are based only on local infor- mation enable the multi-agent swarm to partition into disjoint subgroups that converge to multiple optima of a given multimodal function [17]. The agents are initially placed randomly in the optimization problem’s search space. Also, all agents are assigned the same fitness values. Each execution cycle of the algorithm updates individual fitness values, location and decision domain attributes. The details of the GSO algorithm can be found in [20]. The GSO algorithm has been used here to optimize the risk assessment process. 4 Proposed Method 4.1 Overview of Alert-BDI Alert-BDI is based on the dMARS specification [13] and extends the basic BDI architecture by enabling the agents to use situational awareness to achieve adap- tive alertness. Situational awareness can be gained through exchange of beliefs, belief relevancy, belief agreement and agent reputation [2]. Alertness is the state of being aware of the occurrences of events, and processing the events to detect any unusual and potentially dangerous circumstances. It combines in- formation gathering and analysis of the gathered information to detect threats. Information gathering is the awareness gained by perceiving the environment and retrieving data from its peers. Threat detection is based on agent behavior, that is its interactions with other agents. Malicious agents are not a threat solely to the agents interacting with it but also to other agents in the swarm. Thus, there is an inherent need for 5
  • 6. agents to collaborate and learn from each others experience in dealing with malicious agents. Jean et al [21] proposed a monitoring system is that allows agents to learn and classify agents, not only based on their own observations, but also based on collaboration with other agents in the network. To model the malicious intent of agents, we propose an anomaly detection model, that takes into consideration both the responsiveness of an agent and its truthfulness. Responsiveness is a useful metric, since it helps gauge the willingness of an agent to cooperate with its peers. Also, the truthfulness of an agent may be determined to a greater extent if the agent is responsive. Moreover, in a volatile real-world environment, the validity of truth may change rapidly, and hence the anomaly detection model should take this into consideration, while classifying the agents. 4.2 Structural Specification of Alert-BDI Traditional security techniques can protect agents from certain kinds of attacks. However the autonomy and distributiveness of multi-agent systems require the agents to communicate and cooperate among themselves, to tackle the threats faced by them. T.Y Li and K.Y Lam [22] gave an anomaly detection model for detecting malicious agents, that analyzes mobile agents activity by measuring its movement pattern and residence time on hosts. Observation shows that majority of the agents follow some regular behavior patterns. Hence, anomaly detection may be used to detect agents behaving in an abnormal manner. Figure 2: Anomaly Detection Model The proposed anomaly detection model processes the information gathered by situationally aware agents. This information may be processed to analyze 6
  • 7. the perceptions of risk as perceived by peer agents. The information includes truthfulness and responsiveness of agents. Each individual agent scans its local environment to identify peer agents and their behavior. The agent may commu- nicate with its peers over time. These communications are processed to analyze the truthfulness and responsiveness of agents. The anomaly detection model includes a Model Generator and an Anomaly Detector as shown in Fig 2. The model generator receives behavioral data from peer agents and generates agent models periodically. The anomaly detec- tor receives processed data from the model generator, its own perceptions and classifies the threat posed due to other agents. Each agent may access agent behavioral data from its peers within its com- munication range. With increase in the size of the swarm, the number of neigh- bors within the communication range increases and affects the efficiency of risk assessment. Hence, there is a need to optimize the way agent behavioral data is accessed, so that the efficiency of risk assessment process is enhanced. The agents may use glowworm swarm optimization algorithm to identify agents, whose perceived risks may be considered to model the risk faced by it. Also, agent behavior may change with changing situations, and hence the risk assessment algorithm should consider volatile agent behavior while assessing the risk posed to an agent. Figure 3: Anomaly Detector Algorithm to merge agent behavioral data mergeBehaviourData() 1 /* precondition: received agent behavioral data 2 from a selected group of agents */ 3 /* postcondition: assigned behavioral data to 4 individual agents */ 7
  • 8. 5 n ← #(Neighbor Agents) 6 for i ← 1 to n 7 do comAgents ← ComDomain(Agent i) 8 9 for i ← 1 to #(comAgents) 10 do for j ← 1 to n 11 do data ← Repute(Agent i) ∗ agentData[i][j] 12 behavior[j] ← behavior[j] + data 4.3 Anomaly Detection The Anomaly Detection Model (ADM) received agent behavioral data from individuals in the swarm, and provides them with an estimation of the risks they are subjected to. The ADM consists of the Model Generator and an Anomaly Detector. The Model Generator merges agent behavioral data received from peer agents by assigning weights based on agent reputations. The Anomaly Detector uses the behavioral data synthesized by the Model Generator, and estimates the threat category of the agent as represented in Fig 3. The agent behavioral data used by the Anomaly Detector to detect anomalous behavior includes responsiveness and truthfulness of agents. The responsiveness factor refers to the willingness of an agent to respond to communications by a peer agent. An agent that is non responsive is at best a non-cooperative agent. But it may be a malicious agent as well, and peer agents do not have any technique to verify its truthfulness. An agent is considered cooperative if it is both responsive and truthful. The estimateAgentThreat() algorithm estimates the level of threat posed by an agent by evaluating its responsiveness and truthfulness. It defines four classes of threat levels, namely Cooperative, Suspicious, Malicious and Noxious. The threat level assigned to an agent is volatile, since a change in agent behavior will affect its threat level. Cooperative agents are friendly and pleasant in their interaction with their peers. An agent is labeled suspicious, if it is unresponsive despite being truthful, since its unresponsiveness makes it difficult for its peers to detect a change in its truthfulness. An agent is said to be malicious if the agent has been untruthful in the past and its intentions are not clear, due to its unresponsiveness. A noxious agent is clearly harmful, since it disseminating false information to its peers. Algorithm to estimate the threat level of an agent estimateAgentThreat() 1 /* precondition: received merged responsiveness 2 and truthfulness data of agents */ 3 /* postcondition: assigned threat level to 4 individual agents */ 5 n ← #(Neighbor Agents) 6 for i ← 1 to n 8
  • 9. 7 do if responsive[i] > respondThreshold 8 then 9 if truthful[i] > truthThreshold 10 then 11 classify agent as Cooperative 12 else 13 classify agent as Noxious 14 else 15 if truthful[i] < truthThreshold 16 then 17 classify agent as Malicious 18 else 19 classify agent as Suspicious 20 4.4 Risk Assessment Alert-BDI uses the GSO algorithm, to optimize the way agent behavioral data is retrieved from peer agents, so that the efficiency of risk assessment process is enhanced. The GSO algorithm is used to select a communication domain, and optimize communication domain members based on agent truthfulness. The agents in the system, will identify a group of agents among their neighbors, who will be contacted to retrieve agent behavioral data, to ensure efficiency. The fitness of each agent will be based on its probability of being truthful in its communications. If an agent responds to communication from its neighbors and its peers validate its response as being truthful, it is more likely to be included in the communication groups of other agents. The fitness updation function that decides the value of agent i is given by [17]: Gi(t) = (1 − ρ)Gi(t − 1) + γJi(t) (1) where, Gi(t) is new amount of luciferin, Gi(t − 1) is former amount of luciferin and Ji(t) is fitness of agent i in iteration t of the algorithm and ρ and γ are constants for modeling luciferin gradual drop and the effect of fitness on luciferin. Ji(t) is the degree of truthfulness shown by agent i to its neighbors. For every agent i, the probability of moving into neighboring agent j’s com- munication domain is defined as, Pij(t) = Gj(t) − Gi(t) k∈Ni(t) Gk(t) − Gi(t) (2) where Ni(t) is defined as, Ni(t) = {j : dij < ri d(t); Gi(t) < Gj(t)} and j ∈ Ni(t) (3) where dij is the distance between agents i and j. 9
  • 10. Each agent i maintains communications with a select group of its neighbors; the communication domain Ni(t) of agent i consists of those agents that have a relatively higher fitness value and that are located within a dynamic decision domain whose range, ri d(t), is bounded by a circular sensor range (0 < ri d(t) ≤ rs). The decision domain range for each agent i is updated using the expression, ri d(t + 1) = min{rs, max{0, ri d(t) + β(nt − |Ni(t)|)}} (4) where, β is a constant parameter and nt is a parameter to control the number of agents in the decision domain. Algorithm to determine Communication domain comDomain(agent j) 1 /* precondition: agent j is in the neighborhood of 2 the agent */ 3 /* postcondition: agent j is included or excluded from 4 the communication domain */ 5 agent i ← agent executing comDomain() 6 /* Luciferin updating phase */ 7 Gi(t) = (1 − ρ)Gi(t − 1) + γJi(t) 8 /* Communication Domain updating phase */ 9 /* Determining probability of agent j being included in 10 the Communication domain */ 11 Pij(t) ← Gj (t)−Gi(t) k∈Ni(t) Gk(t)−Gi(t) 12 Ni(t) ← j : dij < ri d(t); Gi(t) < Gj(t) 13 maxAgents ← s 14 while #(Ni(t)) > s 15 do 16 for k ← 1 to #(Ni(t)) 17 do 18 rAgent ← agent k with leastVal(Pij(t)) 19 remove agent rAgent from Ni(t) 20 /* updating range of Communication Domain */ 21 ri d(t + 1) ← min{rs, max{0, ri d(t) + β(nt − |Ni(t)|)}} The communication domain of an agent is the subset of the agent’s neigh- bors from whom the agent would retrieve agent behavioral data. The comDo- main() algorithm is based on the GSO algorithm. It consists of three phases, namely luciferin updation phase, communication domain updation phase and the communication domain range updation phase. The luciferin updation phase is concerned with updating the fitness of the agent based on past and current fitness values. In the communication domain updation phase the agent first determines the probability of agent j being included in its communication domain. This is calculated based on the luciferin values of agents i and j and that of the agents 10
  • 11. in i’s communication domain. Then the communication domain is updated based on the communication domain range of agent i and the luciferin values of agents i and j. If the number of agents in its communication domain exceeds a predefined limit, it discards a member agent that has the lowest probability of inclusion. In the communication domain range updation phase, the agent updates the range of its communication domain based on its sensor range, past value of its communication domain range and the current size of its communication domain. 5 Conclusion In the basic BDI model, agents can exchange beliefs by sending messages to peer agents. However, the absence of a mechanism that enables a multi-agent system to detect threats and assess risks in an efficient and cooperative manner, makes them vulnerable to attacks. In this paper, we propose an extension to the basic BDI model that would enable agents to achieve adaptive alertness using situational awareness. Achiev- ing adaptive alertness that adapts to changing conditions in the environment, enables the agents to employ a security mechanism that can vary to suit the risk faced. Such a variable security mechanism saves the agent’s resources for the fulfillment of their goals. Adaptive alertness achieves the task of threat detection and risk assessment by gaining information through situational awareness among the agents. The agents may communicate with their peers to evaluate agent’s behavior in a col- laborated effort. Moreover, the use of glowworm swarm optimization to optimize the risk assessment process enhances the scalability of the overall system. References [1] N. R. Jennings, K. Sycara, and M. Wooldridge, “A roadmap of agent research and development,” Autonomous Agents and Multi-Agent Systems, vol. 1, no. 1, pp. 7–38, Jan. 1998. [Online]. Available: http://dx.doi.org/10.1023/A:1010090405266 [2] M. S. Hegde and S. Singh, “Aware-BDI: An extension of BDI model in- corporating situational awareness,” in Third International Conference on Communication Systems and Network Technologies 2013 (CSNT 2013), Gwalior, India, April 2013, pp. 100–104. [3] S. Sardina and L. Padgham, “A bdi agent programming language with failure handling, declarative goals, and planning,” Autonomous Agents and Multi-Agent Systems, vol. 23, no. 1, pp. 18–70, Jul. 2011. [Online]. Available: http://dx.doi.org/10.1007/s10458-010-9130-9 [4] F. Ingrand, M. Georgeff, and A. Rao, “An architecture for real-time rea- soning and system control,” IEEE Expert, vol. 7, no. 6, pp. 34–44, Dec. 11
  • 12. [5] M. D’Inverno, M. Luck, M. Georgeff, D. Kinny, and M. Wooldridge, “The dmars architecture: A specification of the distributed multi-agent reasoning system,” Autonomous Agents and Multi-Agent Systems, vol. 9, no. 1-2, pp. 5–53, Jul. 2004. [Online]. Available: http://dx.doi.org/10.1023/B: AGNT.0000019688.11109.19 [6] D. Silva and J. Gluz, “Agentspeak(pl): A new programming language for bdi agents with integrated bayesian network model,” in Information Sci- ence and Applications (ICISA), 2011 International Conference on, April, pp. 1–7. [7] S. Vester, N. Boss, A. Jensen, and J. Villadsen, “Improving multi- agent systems using jason,” Annals of Mathematics and Artificial Intelligence, vol. 61, pp. 297–307, 2011. [Online]. Available: http: //dx.doi.org/10.1007/s10472-011-9225-2 [8] L. Braubach, A. Pokahr, and W. Lamersdorf, “Jadex: A bdi-agent system combining middleware and reasoning,” in Software Agent- Based Applications, Platforms and Development Kits, ser. Whitestein Series in Software Agent Technologies, R. Unland, M. Calisti, and M. Klusch, Eds. Birkhuser Basel, 2005, pp. 143–168. [Online]. Available: http://dx.doi.org/10.1007/3-7643-7348-2 7 [9] K. Hindriks, “A verification logic for goal agents,” in Specification and Verification of Multi-agent Systems, M. Dastani, K. V. Hindriks, and J.-J. C. Meyer, Eds. Springer US, 2010, pp. 225–254. [Online]. Available: http://dx.doi.org/10.1007/978--1--4419--6984--2 8 [10] M. Winikoff, “Jack intelligent agents: An industrial strength platform,” in Multi-Agent Programming, ser. Multiagent Systems, Artificial Societies, and Simulated Organizations, R. Bordini, M. Dastani, J. Dix, and A. Fallah Seghrouchni, Eds. Springer US, 2005, vol. 15, pp. 175–193. [Online]. Available: http://dx.doi.org/10.1007/0--387--26350--0 7 [11] M. J. Huber, “Jam: a bdi-theoretic mobile agent architecture,” in Proceedings of the third annual conference on Autonomous Agents, ser. AGENTS ’99. New York, NY, USA: ACM, 1999, pp. 236–243. [Online]. Available: http://doi.acm.org/10.1145/301136.301202 [12] M. Bratman, Intention, Plans, and Practical Reason. Center for the Study of Language and Information, May 1999. [13] M. d’Inverno, D. Kinny, M. Luck, and M. Wooldridge, “A formal specification of dmars,” in Proceedings of the 4th International Workshop on Intelligent Agents IV, Agent Theories, Architectures, and Languages, ser. ATAL ’97. London, UK, UK: Springer-Verlag, 1998, pp. 155–176. [Online]. Available: http://dl.acm.org/citation.cfm?id=648204.749438 12
  • 13. [14] P. Panzarasa, T. J. Norman, and N. R. Jennings, “Modeling sociality in the bdi framework,” in In Proceedings of First Asia-Pacific Conference on Intelligent Agent Technology (IAT’99, 1999, pp. 202–206. [15] Wikipedia. (2013) Fleiss’ kappa. [Online]. Available: http://en.wikipedia. org/wiki/Fleiss%27 kappa [16] L. Panait and S. Luke, “Cooperative multi-agent learning: The state of the art,” Autonomous Agents and Multi-Agent Systems, vol. 11, no. 3, pp. 387–434, Nov. 2005. [Online]. Available: http: //dx.doi.org/10.1007/s10458-005-2631-2 [17] K. N. Krishnanand and D. Ghose, “Glowworm swarm optimisation a new method for optimising multimodal functions,” Int. J. Comput. Intell. Stud., vol. 1, no. 1, pp. 93–119, May 2009. [Online]. Available: http://dx.doi.org/10.1504/IJCISTUDIES.2009.025340 [18] “Belief-desire-intention software model,” [Available Online] http://en.wikipedia.org/wiki/Belief-desire-intention software model, 2012. [19] A. Guerra-Hern´andez, A. El Fallah-Seghrouchni, and H. Soldano, “Learn- ing in BDI multi-agent systems,” in Proceedings of the 4th international conference on Computational Logic in Multi-Agent Systems, ser. CLIMA IV’04. Berlin, Heidelberg: Springer-Verlag, 2004, pp. 218–233. [20] B. Iranpour and M. Meybodi, “An improved fuzzy based glowworm algorithm,” International Journal of Engineering and Technology, vol. 2, no. 5, pp. 900–905, May 2012. [Online]. Available: http: //iet-journals.org/archive/2012/may vol 2 no 5/3891133114277.pdf [21] E. Jean, Y. Jiao, A. R. Hurson, and T. E. Potok, “Boosting- based distributed and adaptive security-monitoring through agent collaboration,” in Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops, ser. WI-IATW ’07. Washington, DC, USA: IEEE Computer Society, 2007, pp. 516–520. [Online]. Available: http: //dl.acm.org/citation.cfm?id=1339264.1339633 [22] T.-Y. Li and K.-Y. Lam, “Detecting anomalous agents in mobile agent system: a preliminary approach,” in Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2, ser. AAMAS ’02. New York, NY, USA: ACM, 2002, pp. 655–656. [Online]. Available: http://doi.acm.org/10.1145/544862.544894 13