← Back to Patent Index

Communication Graph Vulnerability to Malicious Agents

Project: corpora-patent-1778797329336-d1df8c8b

Contents

Draft Patent Application 14 — For Review

Communication Graph Vulnerability to Malicious Agents

TITLE OF THE INVENTION

Hierarchical Adaptive Defense Framework for Multi‑Agent System Communication Graphs

FIELD OF THE INVENTION

The present invention relates to distributed multi‑agent systems (MAS), specifically to resilient consensus protocols and adaptive graph reconfiguration techniques that safeguard communication graphs against malicious actors.

BACKGROUND AND PRIOR ART

Existing consensus mechanisms such as the Weighted Mean‑Subsequence‑Reduced (W‑MSR) algorithm rely on global knowledge of network robustness and a fixed bound on malicious neighbors [1][2][3]. When communication links are compromised—through packet loss, delay, or intentional tampering—the assumptions underlying W‑MSR are violated, leading to failure of consensus [4]. Moreover, the combinatorial nature of (r, s)‑robustness renders global enforcement impractical for large‑scale MAS deployments [1][2]. Prior work has attempted to embed trusted agents forming a connected dominating set (CDS) to localize misinformation [v12699], but this approach still requires global coordination. Adaptive algorithms that increase connectivity only when necessary have been proposed to balance robustness and vulnerability [v12472], yet they lack formal guarantees in the presence of dynamic link attacks. Recent studies demonstrate that deliberate manipulation of graph structure—through targeted edge perturbations or curvature‑based metrics—can attenuate attack propagation [v13048][v15436]. These limitations motivate the need for a locally enforceable, adaptive defense architecture.

SUMMARY OF THE INVENTION

The invention discloses a hierarchical, adaptive defense framework that integrates Local Robustness Certification (LRC), Secure Graph‑Aware Consensus (SGC), Cascading Attack Mitigation Layer (CAML), and Resilience‑Oriented Graph Evolution (ROGE). LRC enables each agent to compute a lightweight robustness score from its immediate neighborhood and exchange concise certificates, allowing local reconfiguration when the score falls below a threshold. SGC replaces W‑MSR with a trust‑weighted consensus that incorporates zero‑trust signed MQTT messages and dynamic influence radii derived from graph‑adaptive filtering. CAML detects anomalous propagation patterns and isolates suspect sub‑graphs via topology re‑segmentation and cryptographic sandboxes. ROGE models the communication graph as a dynamic graph and applies submodular optimization to autonomously add or remove edges, maximizing a global resilience objective while minimizing overhead. Together, these components provide scalable, formally guaranteed resilience against a wide spectrum of malicious behaviors.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

Embodiment 1 – Local Robustness Certification (LRC)

Each agent i periodically computes a local robustness score R_i based on its degree d_i, clustering coefficient C_i, and recent message integrity checks. The score is encoded into a 2‑bit vector certificate v_i = [b_1, b_2] and broadcast to immediate neighbors. If R_i < τ (a predefined threshold), the agent initiates local reconfiguration: it adds edges to neighbors with high v_j or removes edges to neighbors with low v_j, thereby maintaining a minimum degree condition for resilient consensus [1][2]. The certificate exchange is lightweight and requires no global state.

Embodiment 2 – Secure Graph‑Aware Consensus (SGC)

SGC replaces the W‑MSR filtering rule with a weighted averaging step: each agent computes a trust score τ_j for neighbor j as a function of v_j and a cryptographic attestation (e.g., signed MQTT payload). The consensus update is x_i(t+1) = Σ_j τ_j x_j(t) / Σ_j τ_j. Zero‑trust identity verification is enforced by requiring each MQTT message to be signed with a device‑bound key stored in a TPM or secure element; the broker validates the signature before forwarding [8][v7694][v5635]. The influence radius is dynamically adjusted based on observed attack patterns, inspired by adaptive GNN filtering [9][v6049].

Embodiment 3 – Cascading Attack Mitigation Layer (CAML)

CAML monitors message propagation for anomalous bursts of identical payloads. Upon detection, it triggers a topology re‑segmentation that temporarily isolates suspect sub‑graphs, analogous to the centralized controller’s removal of malicious agents [10]. Each agent maintains a per‑agent Message Authentication Code (MAC) sandbox to contain potential code injection, following lessons from the SSH agent vulnerability [11] and secure IoT protocols [12].

Embodiment 4 – Resilience‑Oriented Graph Evolution (ROGE)

ROGE treats the communication graph as a dynamic graph G(t) = (V, E(t)). Edge reconfiguration actions are selected by a submodular optimization routine that maximizes a global resilience objective (e.g., Choquet‑integral based resilience metric) while minimizing communication overhead [v6337][v4973][v7122][v5002]. The greedy algorithm achieves a (1‑1/e) approximation for monotone submodular objectives under adversarial node removals [v5002]. Edge additions are limited to local neighborhoods to preserve scalability.

Embodiment 5 – Integration and Deployment

The framework is implemented on resource‑constrained edge devices. Certificates and trust scores are transmitted as 2‑bit vectors, and cryptographic operations use lightweight MACs or ECC signatures to satisfy embedded constraints [8][v15586]. The system can be deployed incrementally, integrating with existing MQTT brokers and leveraging zero‑trust identity verification.

CLAIMS

  1. Method for maintaining resilient consensus in a multi‑agent system, comprising: (a) each agent computing a local robustness score from its immediate neighborhood; (b) exchanging a 2‑bit robustness certificate with immediate neighbors; (c) locally reconfiguring edges when the robustness score falls below a threshold; (d) computing a trust score for each neighbor based on received certificates and cryptographic attestations; (e) performing a weighted consensus update using the trust scores; (f) monitoring message propagation for anomalous bursts; (g) isolating suspect sub‑graphs and re‑segmenting the topology; and (h) selecting edge reconfiguration actions via submodular optimization to maximize a global resilience objective while minimizing communication overhead, wherein the submodular optimization is performed autonomously by each agent without global state knowledge.
  2. System for resilient consensus in a multi‑agent system, comprising: a plurality of agents each having a local robustness certification module, a secure graph‑aware consensus module, a cascading attack mitigation module, and a resilience‑oriented graph evolution module, wherein the modules execute the steps of claim 1.
  3. Method of claim 1, wherein the local robustness score is computed as a weighted sum of the agent’s degree, clustering coefficient, and a binary message integrity flag.
  4. Method of claim 1, wherein the 2‑bit robustness certificate encodes a binary indicator of whether the agent’s degree exceeds a minimum threshold and a binary indicator of recent message integrity.
  5. Method of claim 1, wherein the trust score for a neighbor is derived from the neighbor’s robustness certificate and a cryptographic attestation signed with a device‑bound key.
  6. Method of claim 1, wherein the weighted consensus update is performed using a weighted mean‑subsequence‑reduced rule that discards the highest and lowest F values, where F is a locally determined bound on malicious neighbors.
  7. Method of claim 1, wherein the cascading attack mitigation module detects anomalous bursts by comparing the variance of message payloads over a sliding window to a predefined threshold.
  8. Method of claim 1, wherein the resilience‑oriented graph evolution module selects edge additions or removals by maximizing a Choquet‑integral based resilience metric subject to a submodular constraint.
  9. Method of claim 1, wherein the submodular optimization routine is implemented as a greedy algorithm that iteratively selects the edge reconfiguration action yielding the largest marginal increase in the resilience metric.
  10. Method of claim 1, wherein the system operates over an MQTT broker that requires each message to be signed with an ECC key and validated before forwarding.
  11. Method of claim 1, wherein the agents maintain per‑agent MAC sandboxes to contain potential code injection.
  12. Method of claim 1, wherein the local reconfiguration step adds edges to neighbors with robustness certificates above a high‑confidence threshold and removes edges to neighbors with certificates below a low‑confidence threshold.
  13. Method of claim 1, wherein the trust score is updated at each consensus iteration based on the latest received certificates and a decay factor that reduces the influence of stale certificates.
  14. Method of claim 1, wherein the weighted consensus update is performed in a fully distributed manner without any central coordinator.
  15. Method of claim 1, wherein the resilience‑oriented graph evolution module operates asynchronously with the consensus module, allowing continuous adaptation to changing attack patterns.

ABSTRACT

A hierarchical adaptive defense framework for multi‑agent systems is disclosed. The framework integrates Local Robustness Certification (LRC), Secure Graph‑Aware Consensus (SGC), Cascading Attack Mitigation Layer (CAML), and Resilience‑Oriented Graph Evolution (ROGE). Each agent computes a lightweight robustness score from its immediate neighborhood, exchanges concise certificates, and locally reconfigures edges when the score falls below a threshold. Consensus is performed using trust‑weighted updates that incorporate zero‑trust signed MQTT messages and dynamically adjusted influence radii. Anomaly detection monitors message propagation for bursts, triggering isolation of suspect sub‑graphs and cryptographic sandboxes. Edge reconfiguration is guided by submodular optimization to maximize a global resilience objective while minimizing overhead. The system operates without global state knowledge, providing scalable, formally guaranteed resilience against a broad spectrum of malicious behaviors in distributed networks.

References — Cited Sources

Appendix: Cited Sources

1
Distributed Resilience-Aware Control in Multi-Robot Networks 2025-04-03
The main challenge of using W-MSR algorithm lies in the fact that (r, s)-robustness is combinatorial and a function of global network states (i.e., the states of all robots). Existing approaches for maintaining these properties typically require obtaining global state information through inter-agent communication. However, such communication becomes unreliable in the presence of malicious agents. Thus, we present an alternative sufficient condition that is locally controllable. )) be the minimum...
2
Distributed Resilience-Aware Control in Multi-Robot Networks 2025-12-31
The main challenge of using W-MSR lies in the fact that (r, s)robustness is combinatorial and a function of global network states.Existing approaches for maintaining these properties typically require global state knowledge, which depends on inter-agent communication.However, such communication becomes unreliable in the presence of malicious agents.Thus, we present an alternative sufficient condition that is locally controllable. Problem 1.Given a network G(t) = (V, E(t)) under an Ftotal attack ...
3
Home / Insights / Promise and Peril in the Age of Agentic AI: Navigating the New Security Landscape 2026-01-23
Research indicates that treating agents as privileged users requires robust identity governance, including multi-factor authentication adaptations and just-in-time provisioning mechanisms. 1.2.4 Agent Communication Poisoning In complex enterprise deployments, multiple agents will need to collaborate to accomplish sophisticated tasks. This inter-agent communication introduces vulnerabilities to poisoning attacks, where malicious actors inject false information into agent dialogues. Such attacks c...
4
Effects of Communication Disruption in Mobile Agent Trust Assessments for Distributed Security 2004-12-31
In addition, trust-based strategies are examined by which mobile agents assist each other in avoiding malicious hosts and recovering from host attacks. Communication among agents is vital to robust soft security to ensure that agents can cooperate by sharing their host trustworthiness assessments. Since agent mobility inherently makes communication difficult, unreliable, or sometimes impossible, this research conducts experiments to examine the affect of communication link disruption on distribu...
5
A Robustness Analysis to Structured Channel Tampering Over Secure-by-Design Consensus Networks 2023-06-08
However, due to the openness of communication protocols and the complexity of networks, the agreement of MASs may be vulnerable to malicious cyber-attacks . In particular, if the agent sensors are threatened by an attacker, the measured data may be unreliable or faulty. Indeed, the attack signals can even disrupt the control performance of the group of agents through the communication topology. Therefore, resilient solutions are required to ensure that MASs fulfill consensus under security hazar...
6
ACIArena: Toward Unified Evaluation for Agent Cascading Injection 2026-04-08
In such attacks, a compromised agent exploits inter-agent trust to propagate malicious instructions, causing cascading failures across the system. However, existing studies consider only limited attack strategies and simplified MAS settings, limiting their generalizability and comprehensive evaluation. To bridge this gap, we introduce ACIArena, a unified framework for evaluating the robustness of MAS. ACIArena offers systematic evaluation suites spanning multiple attack surfaces (i.e., external ...
7
Large Language Models are Autonomous Cyber Defenders 2025-12-31
Since blue agents only have visibility in their assigned subnetwork (see Fig. 1), they need to exchange messages with each other to share threat information.CAGE 4 allows each agent to broadcast a 1-byte vector per step called Communication Vector, yet its format is undefined.We use this 8-bit protocol and propose a realistic multi-agent communication strategy. Our idea is to summarize the current security level of a network based on each agent's observation and its current state (free or busy)....
8
Systems-Level Attack Surface of Edge Agent Deployments on IoT 2026-02-25
All inter-agent communication uses MQTT pub/sub on the Mac mini broker (port 1883, Tailscale mesh only; no public exposure).Agents publish to topic-structured channels using a JSON envelope carrying sender ID, message type, microsecond timestamp, correlation ID, and payload.The NUC bridges MQTT to Home Assistant's REST API for IoT device control.Model inference calls traverse WAN to cloud providers; all operational IoT traffic remains mesh-local. This design makes MQTT the sole coordination plan...
9
Understanding the Information Propagation Effects of Communication Topologies in LLM-based Multi-Agent Systems 2025-05-28
Motivated by our Insight, EIB-LEARNER balances the error-insight trade-off by co-training two complementary graph neural network (GNN) simulators to simulate the error suppression and insight propagation given a specific query (Section 4.1), and then adaptively blending their learned inter-agent coefficients to construct robust topologies (Section 4.2).The overall pipeline of EIB-LEARNER is shown in Figure 3. GNN-based Propagation Simulators To balance error suppression and insight propagation i...
10
Architectures for Robust Self-Organizing Energy Systems under Information and Control Constraints 2026-04-22
Fig. 3: Reaction to the malicious agent: the centralized controller sends a new communication topology, excluding the malicious agent from communication. Fig. 5 : 5 Fig. 5: Reaction to the malicious agent: multi-leveled controller. Fig. 7 : 7 Fig. 7: Centralized controller: solution quality (performance) for normal operation, disruption and control phases....
11
CVE-2025-47913 is a denial of service vulnerability in Go SSH that causes client panic when receiving unexpected SSH_AGENT_SUCCESS responses. 2026-04-17
SSH clients using this library can experience a panic and subsequent process termination when receiving an unexpected SSH_AGENT_SUCCESS response from a malicious or compromised SSH agent. When the client expects a typed response but instead receives SSH_AGENT_SUCCESS, the improper handling triggers a reachable assertion that crashes the application. This vulnerability allows network-based attackers to crash Go-based SSH client applications without authentication, causing service disruption and p...
12
Detection of malicious beaconing in virtual private networks 2026-05-04
The computer-implemented method of claim 1, wherein the one or more machine learning models are trained on labeled network traffic data that includes known examples of malicious and benign beacons....