{"title":"虚拟环境中的群体智能","authors":"Lukás Révay, I. Zelinka","doi":"10.25073/JAEC.201932.242","DOIUrl":null,"url":null,"abstract":"To simulate some behavior of swarms, the malware was selected as a carrier of intelligence. This article describes the current solution which is fully virtual. This gives us a possibility to interfere environment and see how the improved malware will react. This common intention provides improvements related to docker images and also architectural that is related to code changes. Communication over network together with cooperation on particle level is a key part of this solution. Malware movements are the same as movements of swarm particles, which fully fit this requirement. Significance is also put on the swarming part, where the decision which swarms algorithm to utilize is crucial. The outcome from this work should be partly practical and theoretical related to environment setup, particles communication, movements and coordination which finally finishes in distributed denial of service (DDoS) coordinated attack via hypertext transfer protocol (HTTP) to some server. After this theoretical work, the practical simulation will be done to see if the swarm attack brings expected results. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.","PeriodicalId":250655,"journal":{"name":"J. Adv. Eng. Comput.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Swarm Inteligence in Virtual Environment\",\"authors\":\"Lukás Révay, I. Zelinka\",\"doi\":\"10.25073/JAEC.201932.242\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To simulate some behavior of swarms, the malware was selected as a carrier of intelligence. This article describes the current solution which is fully virtual. This gives us a possibility to interfere environment and see how the improved malware will react. This common intention provides improvements related to docker images and also architectural that is related to code changes. Communication over network together with cooperation on particle level is a key part of this solution. Malware movements are the same as movements of swarm particles, which fully fit this requirement. Significance is also put on the swarming part, where the decision which swarms algorithm to utilize is crucial. The outcome from this work should be partly practical and theoretical related to environment setup, particles communication, movements and coordination which finally finishes in distributed denial of service (DDoS) coordinated attack via hypertext transfer protocol (HTTP) to some server. After this theoretical work, the practical simulation will be done to see if the swarm attack brings expected results. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.\",\"PeriodicalId\":250655,\"journal\":{\"name\":\"J. Adv. Eng. Comput.\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"J. Adv. Eng. Comput.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.25073/JAEC.201932.242\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Adv. Eng. Comput.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.25073/JAEC.201932.242","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
To simulate some behavior of swarms, the malware was selected as a carrier of intelligence. This article describes the current solution which is fully virtual. This gives us a possibility to interfere environment and see how the improved malware will react. This common intention provides improvements related to docker images and also architectural that is related to code changes. Communication over network together with cooperation on particle level is a key part of this solution. Malware movements are the same as movements of swarm particles, which fully fit this requirement. Significance is also put on the swarming part, where the decision which swarms algorithm to utilize is crucial. The outcome from this work should be partly practical and theoretical related to environment setup, particles communication, movements and coordination which finally finishes in distributed denial of service (DDoS) coordinated attack via hypertext transfer protocol (HTTP) to some server. After this theoretical work, the practical simulation will be done to see if the swarm attack brings expected results. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.