Massive Cyber-Attacks Patterns Implemented with BDI Agents

Article Preview

Abstract:

This paper treats the new phenomenon of cyber-war as a new form of human violence between states. The concept of cyber-attack is a particular form of cybernetic war and it is one expensive in terms of cost. We tried to achieve a uniform approach of technological and sociological type using BDI agents and thus making the step to addressing computational sociology of cyberspace. We present two patterns of massive type attacks applicable in cyber space using BDI agents. The approach using BDI agents turned to be flexible and capable to model complex forms of cyber bullying that can occur between two countries in future.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

383-389

Citation:

Online since:

November 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Victor Nitu: Electromagnetic Field Exposure from GSM and UMTS Indoor Base Stations, (Applied Mechanics and Materials, OPTIROB 2013).

DOI: 10.4028/www.scientific.net/amm.332.98

Google Scholar

[2] Muhammad Ushaq, Fang Jian Cheng, Ali Jamshaid: A Fault Tolerant SINS/GPS/CNS Integrated Navigation Scheme Realized through Federated Kalman Filter, (Applied Mechanics and Materials, OPTIROB 2013).

DOI: 10.4028/www.scientific.net/amm.332.104

Google Scholar

[3] J. Carr: Inside Cyber Warfare: Mapping the Cyber Underworld, Sebastopol, O'Reilly Media; 2nd edition (2011).

Google Scholar

[4] J. L. Bayuk, J. Healey, et. all: Cyber Security Policy Guidebook, New Jersey, John Wiley & Sons, Inc. (2012).

Google Scholar

[5] E. G. Amoroso: Cyber Attacks Protecting National Infrastructure, Burlington, Elsevier Inc. (2011).

Google Scholar

[6] J. Andress, S. Winterfeld, et. all: Cyber Warfare Techniques, Tactics and Tools for Security Practitioners, Waltham, Elsevier, Inc. (2011).

Google Scholar

[7] N. Choucri: Cyberpolitics in International Relations, Massachusetts, MIT Press, (2012).

Google Scholar

[8] F. C. Zagare and D. M. Kilgour: Perfect Deterrence, Cambridge, Cambridge University Press, (2000).

Google Scholar

[9] P. M. Morgan: Deterrence Now, Cambridge, Cambridge University Press (2003).

Google Scholar

[10] W. L. Pritchett and D. De Smet: Kali Linux Cookbook, Birmingham, Packt Publishing (2013).

Google Scholar

[11] T. Heriyanto, L. Allen and S. Ali: Kali Linux: Assuring Security By Penetration Testing, Birmingham, Packt Publishing, (2014).

Google Scholar

[12] J. Muniz and A. Lakhani, Web Penetration Testing with Kali Linux, Birmingham, Packt Publishing, (2013).

Google Scholar

[13] C. P. Paulino, Nmap 6: Network exploration and security auditing Cookbook, Birmingham, Packt Publishing, (2012).

Google Scholar

[14] Vasile Prisacariu, Mircea Boşcoianu, Ionică Circiu: Morphing Wing Concept for Small UAV, (Applied Mechanics and Materials, OPTIROB 2013).

DOI: 10.4028/www.scientific.net/amm.332.44

Google Scholar

[15] Vasile Prisacariu, Corina Boşcoianu, Ionică Circiu, Mircea Boşcoianu: The Limits of Downsizing - A Critical Analysis of the Limits of the Agile Flying Wing MiniUAV, (Applied Mechanics and Materials, Volume 772, 2015).

DOI: 10.4028/www.scientific.net/amm.772.424

Google Scholar

[16] F. Squazzoni: Agent-Based Computational Sociology, West Sussex, John Wiley & Sons Ltd, (2012).

Google Scholar

[17] M. d'Inverno M. Luck: Understanding Agent Systems, Springer-Verlag Berlin, 2nd edition (2004).

Google Scholar