Loading...

Capturing an intruder in the pyramid

Shareghi, P ; Sharif University of Technology | 2006

376 Viewed
  1. Type of Document: Article
  2. DOI: 10.1007/11753728_58
  3. Publisher: Springer Verlag , 2006
  4. Abstract:
  5. In this paper, we envision a solution for the problem of capturing an intruder in one of the most popular interconnection topologies, namely the pyramid. A set of agents collaborate to capture a hostile intruder in the network. While the agents can move in the network one hop at a time, the intruder is assumed to be arbitrarily fast, i.e. it can traverse any number of nodes contiguously as far as there are no agents in those nodes. Here we consider a new version of the problem where each agent can replicate new agents when needed, i.e. the algorithm starts with a single agent and new agents are created on demand. In particular, we propose two different algorithms on the pyramid network and we will later discuss about the merits of each algorithm based on some performance criteria. © Springer-Verlag Berlin Heidelberg 2006
  6. Keywords:
  7. Algorithms ; Computer system firewalls ; Computer viruses ; Computer worms ; Security of data ; Software agents ; Intruder ; Network topology ; Performance criteria ; Pyramid network ; Network protocols
  8. Source: 1st International Computer Science Symposium in Russia, CSR 2006, St. Petersburg, 8 June 2006 through 12 June 2006 ; Volume 3967 LNCS , 2006 , Pages 580-590 ; 03029743 (ISSN)
  9. URL: https://link.springer.com/chapter/10.1007%2F11753728_58