A Trustworthy Agent Based Online Auction System Rinkesh Patel CIS Master Project – Spring 2006 Advisor: Dr. Haiping Xu.

Slides:



Advertisements
Similar presentations
Operating-System Structures
Advertisements

Building Portals to access Grid Middleware National Technical University of Athens Konstantinos Dolkas, On behalf of Andreas Menychtas.
Technical and design issues in implementation Dr. Mohamed Ally Director and Professor Centre for Distance Education Athabasca University Canada New Zealand.
Mobile Agents Mouse House Creative Technologies Mike OBrien.
JavaSpaces and TSpaces Theresa Tamash CDA 5937 November 4, 2002.
Online Real Estate System Group Members Introduction Member 1 Name: Awais Khalil VU ID: BC Introduction: Assalam-o-Alaikum, I am Awais Khalil.
SELBO Agent Ivan Minov University of Plovdiv “Paisii Hilendarski“
Sensor Network Platforms and Tools
Voroat Kong ENG393 Section 501 Date: 6 th May, 2010.
Agents in the previous examples Agents are just 3D objects in virtual worlds Agents are not independent thread. No agent architecture. ……
Computer Monitoring System for EE Faculty By Yaroslav Ross And Denis Zakrevsky Supervisor: Viktor Kulikov.
Specifying Agent Interaction Protocols with AUML and OCL COSC 6341 Project Presentation Alexei Lapouchnian November 29, 2000.
Adding Organizations and Roles as Primitives to the JADE Framework NORMAS’08 Normative Multi Agent Systems, Matteo Baldoni 1, Valerio Genovese 1, Roberto.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Two main requirements: 1. Implementation Inspection policies (scheduling algorithms) that will extand the current AutoSched software : Taking to account.
Application architectures
09/28/2007 CIS Dept., UMass Dartmouth 1 Trustworthy Agent-Based Online Auction Systems Prof. Haiping Xu Concurrent Software Systems Laboratory Computer.
Managing Agent Platforms with the Simple Network Management Protocol Brian Remick Thesis Defense June 26, 2015.
Chapter 4: Database Management. Databases Before the Use of Computers Data kept in books, ledgers, card files, folders, and file cabinets Long response.
JADE Java Agent Development Framework An Overview.
Fawaz Alsaadi Fahad Alsolmai.  Role Based Multi-Agent System for providing effective and secure Bank transaction services  To provide seamless access.
Multi-Agent System for Online Auctions Jose Manuel Valladares Pernas CIS Master Project - Fall 2004 Advisor: Dr. Haiping Xu.
Real Time Commercial Bidding System Team 9 Robert Banta Robert Banta Neil Sanborn Neil Sanborn Lauren Palmer Lauren Palmer Michael Prince.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Course Instructor: Aisha Azeem
Maintaining and Updating Windows Server 2008
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
Application architectures
IMS 4212: Distributed Databases 1 Dr. Lawrence West, Management Dept., University of Central Florida Distributed Databases Business needs.
MSF Requirements Envisioning Phase Planning Phase.
STUDENT EXCHANGE PROGRAM
Agent-based Device Management in RFID Middleware Author : Zehao Liu, Fagui Liu, Kai Lin Reporter :郭瓊雯.
INTELLIGENT AUTOMATION INC. Extending Rational Rose to support MAS design in UML Intelligent Automation Inc. 2 Research Place, Suite 202 Rockville, MD.
Agent-Oriented Software Engineering CSC532 Xiaomei Huang.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
On the Internet, an intelligent agent (or simply an agent ) is a program that gathers information or performs some other service (typically search queries.
Computer Emergency Notification System (CENS)
Architectural Design lecture 10. Topics covered Architectural design decisions System organisation Control styles Reference architectures.
Distributed Information Retrieval Using a Multi-Agent System and The Role of Logic Programming.
NET-AUCTION This online auction project Directed by: Mr. Maxim Gurevich Submitted by: Yuri Kipnis Alex Scheotkin Alex Scheotkin.
Bio-Networking: Biology Inspired Approach for Development of Adaptive Network Applications 21 May 2005Ognen Paunovski Bio-Networking: Biology Inspired.
ECI – electronic Commerce Infrastructure “ An application to the Shares Market ” Demetris Zeinalipour ( Melinos Kyriacou
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 13. Review Shared Data Software Architectures – Black board Style architecture.
Liang, Introduction to Java Programming, Sixth Edition, (c) 2005 Pearson Education, Inc. All rights reserved Chapter 27 JavaBeans and.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Workforce Scheduling Release 5.0 for Windows Implementation Overview OWS Development Team.
Intelligent Agents. 2 What is an Agent? The main point about agents is they are autonomous: capable of acting independently, exhibiting control over their.
August 2003 At A Glance The IRC is a platform independent, extensible, and adaptive framework that provides robust, interactive, and distributed control.
Agent Overview. Topics Agent and its characteristics Architectures Agent Management.
Liang, Introduction to Java Programming, Seventh Edition, (c) 2009 Pearson Education, Inc. All rights reserved Chapter 32 JavaBeans and Bean.
ONLINE SHOPPING. Refers to buying and selling of goods and services using websites accessed through the internet physical goods such as clothes and books.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
A Project Report ON ONLINE AUCTION PORTAL A project report Submitted in Partial Fulfillment Award of degree Master of Computer Application [Batch ]
Intelligent Agents Chapter 2. How do you design an intelligent agent? Definition: An intelligent agent perceives its environment via sensors and acts.
Banaras Hindu University. A Course on Software Reuse by Design Patterns and Frameworks.
Active-HDL Server Farm Course 11. All materials updated on: September 30, 2004 Outline 1.Introduction 2.Advantages 3.Requirements 4.Installation 5.Architecture.
INTELLIGENT AGENTS AND THEIR APPLICATIONS IN E-BUSINESS.
INTRODUCTION About Project: About Project: Our project is based of the technology of cloud computing which is offering many pro’s to the world of computers.
Djohan Wahyudi Supervised by: Prof. Dr. Pericles A. Mitkas Vivia Nikolaidou 1.
Real-Time Systems Laboratory Seolyoung, Jeong JADE (Java Agent DEvelopment framework )
Use Case Diagrams A Detailed Description. Use Case Diagrams Use case diagrams describe relationships between users and use cases A use case is a (usually.
Multi-Agent System for Online Auctions Jose Manuel Valladares Pernas CIS Master Project - Fall 2004 Advisor: Dr. Haiping Xu.
Introduction to Operating System (OS)
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Database System Concepts and Architecture.
User Interface Agent Matias Kassala JYPE
Data, Databases, and DBMSs
Observer Design Pattern
Presentation transcript:

A Trustworthy Agent Based Online Auction System Rinkesh Patel CIS Master Project – Spring 2006 Advisor: Dr. Haiping Xu

Online Auctions Most Online Auctions specialize in person-to- person activity where individual sellers or small businesses sell their items directly to consumers. In these auctions, the seller — not the site — has the merchandise, and often, the site will not take responsibility for any problems that may arise between buyers and sellers. Ebay, Amazon, Yahoo Auctions…

Multi Agent System Multi-Agent System –An intelligent agent is an autonomous computer program capable of carrying out one or more tasks on behalf of (human) user. –A multi-agent system is a concurrent system that contains more than one agent. Agent Properties includes –Autonomy : agents operate autonomously, having a control over their actions and internal state –Sociability : agents interact with other agents using some communication language –Reactivity : agents perceive their environment, and respond in a timely fashion to environment changes. –Pro- Activeness : agents do not simply act in response to their environment, they are able to exhibit goal-directed behavior by taking the initiative.

Outline Part 1: Agent Based Online Auction System –Is a multi-agent system that facilitates online auctions on behalf of users. –Provides users with different default bidding strategies. –Allows users to customize their bidding strategies Part 2: Trustworthy Agent Based Online Auction System –Introduces a Security Agent that detects real-time Shilling Behaviors and inform to bidding agents. –Provides a Secure Online Auction System Conclusions and Future Work Part 1:Part 1: Agent Based Online Auction System –Is a multi-agent system that facilitates online auctions on behalf of users. –Provides users with different default bidding strategies. –Allows users to customize their bidding strategies

Objective Develop an online auction system using Java Agent DEvelopment Framework (JADE). Provide an agent system that facilitates online auctions on behalf of users. Develop a Search Agent which matches the requirements of user from available auction items. Provide agents to the users with different strategies for the bidding on items. Develop a Security Agent –monitors ongoing auctions for undesired bidding patterns –informs the other bidders for abnormal bidding behaviors

JADE Description of JADE –JADE stands for Java Agent Development Framework ( –Open source platform implemented in Java (ubiquity, portability). –Complies with the FIPA specification. –Supports asynchronous message passing communication. Features of JADE –Agents can be distributed across machines. –Supports agent migration. –Includes graphical tools to monitor the agents.

JADE Behaviors –A behavior is basically an Event Handler, a method which describes how an agent reacts to an event: the reception of a message or a Timer interrupt. –The Event Handler code is placed in a method called action. Every behavior is scheduled following a round robin algorithm. –Methods of the agents involving behaviours: addBehaviour, removeBehaviour. –Examples of Behaviours already included in JADE: SimpleBehaviour CyclicBehaviour TickerBehaviour WakerBehaviour ReceiverBehaviour ParallelBehaviour SequentialBehaviour

Architecture Client(s ) Server Database Security Agent Main Agent Auction Agent GUI Agent Selling/Bidding Agent Search Agent GUI Decision Tree Responsible for creating a new accounts and new auctions Controls a particular auctions Provide safe and secure auctions Detects Shilling Search for auction on behalf of user GUI for interaction with user Interacts with other Agents Bid/Sell on behalf of user.

Architecture Database Security Agent Main Agent Auction Agent GUI Agent Bidding Agent Search Agent GUI Decision Tree Search Agent Bidding Agent GUI GUI Agent Auction Agent Server Client#1Client#2

Auction Server Main Agent –Responsible to create new users, login, create auctions and get the list of auctions. –Creates the Auction Agent when a new auction is added to the system. –Responds to the queries for items or auctions. Auction Agent –In charge of the control of a particular auction. –Users register to the auction and then send bids to the Auction Agent. The Auction Agent notifies the registered users of the price changes of the item. –At the end of the auction, this agent notifies the winner and the seller and passes control to the Main Agent. –When the auction is over, this agent is deleted.

Auction Server GUI Server –Receives commands from the user and acts correspondingly. It doesn’t have pro-active behavior. –It does all the actions available in the user interface. –Updates the auction information when messages are received from the other agents. Search Agent –Responsible for searching for items on behalf of the user. –Notifies the user when auctions of his/her desired items are available. Security Agent –Provides Safe and Secure Environment.

Auction Client GUI Agent –Receives commands from the user and acts correspondingly. It doesn’t have pro-active behavior. –It does all the actions available in the user interface. –Updates the auction information when messages are received from the other agents. Seller Agent –is responsible of placing auctions on behalf of the user. Buyer Agent –Join the auctions on behalf of the User.

Auction Client Bidding Agent –Is responsible of placing bids automatically on behalf of the user. –Can be configured by the user using one of the available strategies (OneShotBid, PeriodicBid,…) or using Custom strategies to bid on particular auction. –Custom Strategies provide a better way to configure bidding agents. –User can developed any strategy on which bidding agent will configured to work.

Class Diagram

JADE Strategies

Bidding Strategies How it works –Every strategy (BidConfiguration) contains an object behavior that extends one of the JADE Behaviors. –Actual Bidding process happens when the action method of the JADE behavior. –The BidConfiguration object contains a JPanel where the user enters the parameters for the bidding. –The JPanel is displayed inside a Dialog where the user chooses the strategy with a combo box. –Auction System Provides, –Normal Strategy : OneShotBehavior –Incremental Strategy : PeriodicBehaviour

Bidding Strategy

Custom Strategies We propose an option to create and apply bidding strategies for bidding agent by users. Bidding Template: –We have provided a standard template for custom strategies. IF THEN –AND, OR,, = e.g.: –IF Start_Bid <= CURRENT_BID AND Max_Bid < MAX_BID THEN CURRENT_BID = CURRENT_BID + FIX_BID

Customize Bidding Strategy

Bidding Procedure When the user enters the information for the automatic bidding: –The BidConfiguration object is populated with the data and passed to the BiddingAgent. –The BiddingAgent calls the setupBehaviour method that registers the behaviour object contained in the BidConfiguration. –When the event that the behaviour is listening to happens, the method action is called and the bidding happens.

Trustworthy Auction Client

Trustworthy Auction Server

Outline Part 1: Agent Based Online Auction System –Is a multi-agent system that facilitates online auctions on behalf of users. –Provides users with different default bidding strategies. –Allows users to customize their bidding strategies Part 2: Trustworthy Agent Based Online Auction System –Introduces a Security Agent that detects real-time Shilling Behaviors and inform to bidding agents. –Provides a Secure Online Auction System Conclusions and Future Work

Agent based Online Auctions Not Trustable –Agent-based online auction have not yet become popular because they are not trustable. e.g. one of the big concerns in online auctions is the shilling behavior problem. Not Real Time –E-Bay, the world’s leading and widely used Auction site does not have any real time software tools to detect shilling behaviors. Shill Hunter : Software used in E-Bay to check closed auctions.

Shill Bidding Shill bidding is the deliberate placing of bids to artificially raise the price of an item and is not allowed. Shill bidding occurs when the seller disguises himself as a legitimate bidder by using a second identity or account solely for the purpose of pushing up the sale price.

Shill Bidding Examples Example # John lists 2 boats (#1 and #2), both with a $10,000 reserve price at the same time. On boat #1, Alison bids $6,000 on the boat, but the Reserve Price is not met. To get the bidding higher, John places a bid himself at $7,000, using a different user name. Another bidder, Marlon, then bids $8000. The item doesn’t sell successfully. On boat #2, Dave bids $8000. John then bids $9000, using a different user name. Dave bids $10,000 and wins the boat.

How to do Shill Bidding Bidding on own Item Dummy Bidder Devoted Bidder –With Reserve Price –Without Reserve Price Bidder-to-Seller Feedback Short Term Bidder Using Bidding Agent Strategies it is possible to replicate same behavior.

How to Spot Shilling Security Agent: –Shill bidding is one of the major problems in real time auctions –Security agent detects patterns in ongoing auctions which are resembles shilling behaviors, and using a concept of decision tree agent takes decision for degree of shilling behaviors. –Shilling Patterns: Devoted Bidder Shotgun Feedback Numerous Retraction Concurrent Bidding

How to Spot Shilling… Many bids on an auction from different users who has 0 feedback are probable suspect. High bidder retracts bid after pumping up the bidding. Background Check –Bidder has same country/server/location/terms/ registration date as auction seller. An account that has won auctions, but never received any feedback. An even stronger indication is an account that has received feedback from only this seller. Bidders all sign up within a short period of time. The first bid is received minutes after the auction was listed. Usually bidder took their time to check auction item and bidding for that.

Decision Tree Same Account Yes No Shill Bidding First bid Right after bid placement Regular Same IPNo of Feedback …Cross Feedback More Yes Same IP Probable Shill Bidding Yes No Less … … … …

Security Agent Monitors bidding behaviors in ongoing auctions Detects possible shilling behaviors. If founds any such behaviors, then informs all current bidding agents of that auction. On the basis of degree of shilling behavior, Security agent informs that agent about unfair and biased behavior and takes possible actions. Upon receiving shilling behavior information in online auctions, the bidding agent can take appropriate actions accordingly in order to protect the users’ interests.

Security Agent

Conclusions & Future work Proposed a general architecture for agent-based online auction system. Designed a security agent that supports detection of shilling behaviors. Developed a prototype of trustworthy agent-based online auction system. Will design a language that supports flexible configuration of bidding strategies. Will develop a more sophisticated security agent that can effectively and efficiently detect shilling behaviors.