{"title":"Agent-oriented design for network survivability","authors":"M. Shajari, A. Ghorbani","doi":"10.1109/ISDA.2005.20","DOIUrl":null,"url":null,"abstract":"Intelligent behavior is the selection of actions based on knowledge. The design of the fuzzy adaptive survivability tool (FAST) agents and their intelligent behavior is explained. A FAST agent uses Belief-Desire-Intention (BDI) logic as the reasoning framework to decide on desirable response plans. These decisions are both context-sensitive to take into account the changes in the network status and cost-sensitive to avoid the risk of collateral damage. A real-world scenario, which shows how the FAST agents choose desirable responses to mitigate scanning worm traffic, is also presented.","PeriodicalId":345842,"journal":{"name":"5th International Conference on Intelligent Systems Design and Applications (ISDA'05)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"5th International Conference on Intelligent Systems Design and Applications (ISDA'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDA.2005.20","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Intelligent behavior is the selection of actions based on knowledge. The design of the fuzzy adaptive survivability tool (FAST) agents and their intelligent behavior is explained. A FAST agent uses Belief-Desire-Intention (BDI) logic as the reasoning framework to decide on desirable response plans. These decisions are both context-sensitive to take into account the changes in the network status and cost-sensitive to avoid the risk of collateral damage. A real-world scenario, which shows how the FAST agents choose desirable responses to mitigate scanning worm traffic, is also presented.