Review of the Main Security Problems with Multi-Agent Systems used in E-commerce Applications
Abstract The ability to connect to the Internet from a wide variety of devices such as smart phones, IoT devices and desktops at anytime and anywhere, produces a large number of e-commerce transactions, such as purchases of clothes, ticket entrances for performances, or banking operations. The increasing number of these transactions has also created an increase in the number of threats and attacks by third parties to access user data banks. It is important to control the access procedure to user data so that the number of threats does not continue to grow. To do so, it is necessary to prevent unauthorized access, theft and fraud in electronic commerce, which is required to ensure the safety of these transactions. Many e-commerce platforms are developed through multi-agent-systems because they include certain advantages to control the product, resource management, task distribution, etc. However, there are a number of threats that can jeopardize the safety of the agents that make up the system. These issues must be taken into account in the development of these multi-agent systems. However, existing methods of development do not cover in depth the issue of security. It is necessary to present and classify the potential security flaws of multi-agent systems. Therefore, the present research presents a review of the main vulnerabilities that occur in multi-agent systems responsible for managing e-commerce applications, as well as the proposed solutions to the major security problems on these platform systems. The main conclusions provided by this research is the need to optimize security measures and enhance the different security solutions applied in e-commerce applications in order to prevent identity theft, access to private data, access control, etc. It is therefore essential to continue to develop the security methods employed in applications such as e-commerce as different types of attacks and threats continue to evolve.
- Referencias
- Cómo citar
- Del mismo autor
- Métricas
Bijani, S., & Robertson, D. (2014). A review of attacks and security approaches in open multi-agent systems. Artificial Intel-ligence Review, 42(4), 607-636. https://doi.org/10.1007/s10462-012-9343-1
Borselius, N. (2002, June). Security in multi-agent systems. In Proceedings of the 2002 International Conference on Security and Management (SAM'02) (pp. 31-36).
Bouch, A. (2011). 3-D Secure: A critical review of 3-D Secure and its effectiveness in preventing card not present fraud. University of London, Londra, eri?im: http://www. 58bits. com/thesis/3-D_Secure. pdf, eri?im tarihi, 8, 2014.
Cremonini, M., Omicini, A., & Zambonelli, F. (1999). Multi-agent systems on the Internet: Extending the scope of coordina-tion towards security and topology. InMulti-Agent System Engineering (pp. 77-88). Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-48437-X_7
Jung, Y., Kim, M., Masoumzadeh, A., & Joshi, J. B. (2012). A survey of security issue in multi-agent systems. Artificial Intelli-gence Review, 37(3), 239-260. https://doi.org/10.1007/s10462-011-9228-8
Lokhande, P. S. (2013). E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures.
Mouratidis, H., Giorgini, P., & Manson, G. (2003, July). Modelling secure multiagent systems. In Proceedings of the second in-ternational joint conference on Autonomous agents and multiagent systems (pp. 859-866). ACM. https://doi.org/10.1145/860575.860713
Niranjanamurthy, M., & Chahar, D. D. (2013). The study of e-commerce security issues and solutions. International Journal of Advanced Research in Computer and Communication Engineering, 2(7), 2885-2895.
Stallings, W., & Brown, L. (2008). Computer security. Principles and Practice.
Viega, J., Bloch, J. T., & Chandra, P. (2001). Applying aspect-oriented programming to security. Cutter IT Journal, 14(2), 31-39.
Wong, H. C., & Sycara, K. (2000). Adding security and trust to multiagent systems. Applied Artificial Intelligence, 14(9), 927-941. https://doi.org/10.1080/08839510050144886
Borselius, N. (2002, June). Security in multi-agent systems. In Proceedings of the 2002 International Conference on Security and Management (SAM'02) (pp. 31-36).
Bouch, A. (2011). 3-D Secure: A critical review of 3-D Secure and its effectiveness in preventing card not present fraud. University of London, Londra, eri?im: http://www. 58bits. com/thesis/3-D_Secure. pdf, eri?im tarihi, 8, 2014.
Cremonini, M., Omicini, A., & Zambonelli, F. (1999). Multi-agent systems on the Internet: Extending the scope of coordina-tion towards security and topology. InMulti-Agent System Engineering (pp. 77-88). Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-48437-X_7
Jung, Y., Kim, M., Masoumzadeh, A., & Joshi, J. B. (2012). A survey of security issue in multi-agent systems. Artificial Intelli-gence Review, 37(3), 239-260. https://doi.org/10.1007/s10462-011-9228-8
Lokhande, P. S. (2013). E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures.
Mouratidis, H., Giorgini, P., & Manson, G. (2003, July). Modelling secure multiagent systems. In Proceedings of the second in-ternational joint conference on Autonomous agents and multiagent systems (pp. 859-866). ACM. https://doi.org/10.1145/860575.860713
Niranjanamurthy, M., & Chahar, D. D. (2013). The study of e-commerce security issues and solutions. International Journal of Advanced Research in Computer and Communication Engineering, 2(7), 2885-2895.
Stallings, W., & Brown, L. (2008). Computer security. Principles and Practice.
Viega, J., Bloch, J. T., & Chandra, P. (2001). Applying aspect-oriented programming to security. Cutter IT Journal, 14(2), 31-39.
Wong, H. C., & Sycara, K. (2000). Adding security and trust to multiagent systems. Applied Artificial Intelligence, 14(9), 927-941. https://doi.org/10.1080/08839510050144886
González Briones, A., Chamoso, P., & Barriuso, A. (2016). Review of the Main Security Problems with Multi-Agent Systems used in E-commerce Applications. ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, 5(3), 55–61. https://doi.org/10.14201/ADCAIJ2016535561
Most read articles by the same author(s)
- Pablo Chamoso, Fernando De La Prieta, Gabriel Villarrubia, Intelligent system to control electric power distribution networks , ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal: Vol. 4 No. 4 (2015)
- Juan M. Corchado, Sebastian López F., Juan M. Núñez V., Raul Garcia S., Pablo Chamoso, Generative Artificial Intelligence: Fundamentals , ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal: Vol. 12 (2023)
- Pablo Chamoso, Fernando De La Prieta, Swarm-Based Smart City Platform: A Traffic Application , ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal: Vol. 4 No. 2 (2015)
- María Eugenia Pérez-Pons, Javier Parra-Domínguez, Pablo Chamoso, Marta Plaza, Ricardo Alonso , Efficiency, profitability and productivity: Technological applications in the agricultural sector , ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal: Vol. 9 No. 4 (2020)
- Pablo Chamoso, Fernando De La Prieta, Simulation environment for algorithms and agents evaluation. , ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal: Vol. 4 No. 3 (2015)
- Pablo Chamoso, Henar Pérez-Ramos, Ángel García-García, ALTAIR: Supervised Methodology to Obtain Retinal Vessels Caliber , ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal: Vol. 3 No. 4 (2014)
- Sigeru Omatu, Tatsuyuki Wada, Pablo Chamoso, Odor Classification using Agent Technology , ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal: Vol. 2 No. 4 (2013)
Downloads
Download data is not yet available.
+
−