MULTI-AGENT DEFENSE SYSTEMS AND THEIR EFFECTIVENESS EVALUATION

MULTI-AGENT DEFENSE SYSTEMS AND THEIR EFFECTIVENESS EVALUATION

Authors

  • Kurbonaliyeva Dilshoda Vali kizi PhD Student, Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Email: dilshodavaliyevna@gmail.com https://orcid.org/0009-0003-3713-7422

DOI:

https://doi.org/10.5281/zenodo.17436770

Keywords:

Multi-Agent Systems (MAS), Distributed Cybersecurity Architecture, Intrusion Detection and Prevention Systems (IDS/IPS), IoT Security, Real-Time Threat Response, Autonomous Security Agents, Federated Learning in Cyber Defense, Artifcial Intelligence for Network Security, Resilient System Design, Decentralized Decision-Making.

Abstract

This paper explores the effectiveness of Multi-Agent Systems (MAS) in modern cybersecurity infrastructures.
As traditional centralized models struggle to address dynamic and complex threats, MAS provides a distributed and
autonomous alternative. The study evaluates real-world MAS implementations such as Suricata, HoneyMesh, Google
DC Agents, AWS IoT Defender, Azure Sphere, Tesla FSD, and IBM QRadar-Watson using three key indicators: response
time, detection accuracy, and overall efciency.
Findings show that agent-based architectures enhance system resilience, enable real-time threat analysis, and mitigate
single points of failure. Integration with artifcial intelligence (AI) and federated learning further improves predictive
capabilities. MAS also supports proactive defense, adaptive coordination, and efcient resource utilization, making them
ideal for securing IoT environments, edge computing systems, and future 6G networks. The results highlight MAS as a
strategic solution for building flexible, scalable, and intelligent cybersecurity frameworks capable of addressing evolving
digital threats.



References

Bozorov, S., Akhmedova, N., Qurbonaliyeva, D., & Gultekin, K. (2024). Survey on honeypot: Detection, countermeasures

and future with MI. AIP Conference Proceedings.

Xudoyqulov, Z. T., Qurbonaliyeva, D. V., & Bozorov, S. M. (2024). Honeypot texnologiyasining funksional imkoniyatlarini

tadqiq etish. Al-Farg’oniy avlodlari.

Kotenko, I., & Chechulin, A. (2017). Agent-based simulation of cyber-attacks and countermeasures in computer

networks. Journal of Computer and Systems Sciences International, 56(3), 344–356.

Jennings, N. R. (2001). An agent-based approach for building complex software systems. Communications of the

ACM, 44(4), 35–41.

Kiss, Á., Gulyás, G. G., & Imre, S. (2020). HoneyMesh: Distributed honeypot framework for Internet of Things. Computer

Networks, 170, 107100.

Bonabeau, E., Dorigo, M., & Theraulaz, G. (1999). Swarm Intelligence: From Natural to Artifcial Systems. Oxford

University Press.

Zhang, Y., Chen, T., & Wang, X. (2021). An intelligent multi-agent system for adaptive intrusion detection in cloud

environments. IEEE Transactions on Cloud Computing.

Rahman, M. A., Abedin, S. F., & Karim, M. R. (2022). Decentralized cybersecurity architecture using multi-agent

reinforcement learning. Computers & Security, 115, 102620.

Chen, H., & Wang, K. (2020). Swarm intelligence driven security agents for IoT networks. Ad Hoc Networks, 104,

Das, A., & Sengupta, A. (2023). Federated multi-agent systems for real-time anomaly detection in 5G networks. Future

Generation Computer Systems, 147, 1–12.

Amazon Web Services. (2018). AWS IoT Device Defender – Technical Whitepaper.

Microsoft Corporation. (2019). Azure Sphere Security Overview.

Open Information Security Foundation (OISF). (2009). Suricata: Next Generation IDS/IPS Engine.

IBM Corporation. (2017). IBM QRadar and Watson for Cybersecurity.

Mastercard AI Security Lab. (2018). AI-Driven Fraud Detection System.

Tesla, Inc. (2020). Full Self-Driving (FSD) System Security Architecture.

https://yashil-iqtisodiyot-taraqqiyot.uz/journal

Downloads

Published

2025-04-30

How to Cite

Kurbonaliyeva Dilshoda Vali kizi. (2025). MULTI-AGENT DEFENSE SYSTEMS AND THEIR EFFECTIVENESS EVALUATION. Innovation Science and Technology, 1(4), 77–81. https://doi.org/10.5281/zenodo.17436770
Loading...