N-grams Based Supervised Machine Learning Model for Mobile Agent Platform Protection against Unknown Malicious Mobile Agents
نویسندگان
چکیده
A collection of executable programs known as a Mobile agent (MA) migrates from one execution platform to another in a heterogeneous network to perform various tasks on the behalf of its user [1]. The employment of mobile agents introduce many benefits to the distributed computing including network load reduction, overcoming network latency, executing dynamically, asynchronously and autonomously [2]. In many respects, a mobile agent is analogous to a computer virus, since it travels from one computer to another and it utilizes computer resources or it creates clones of itself to achieve its goals. The major difference between both is the usefulness of mobile agent and its friendly behavior. However, the mobile agents while moving in the network, brings with them the fear of Trojan horses, viruses and other invasive means or entities [3]. This is because the attacks can be occurred when the mobile agent traverses in the communication channel and there may be some muggers earwigging the network either to gain some of the information carried by the agent or information stored in the agent platform (i.e. passive attack) or mutating that information for their own advantage (i.e. active attack) [4, 37]. In recent years, numerous researchers have done considerable studies in order to prevent malicious mobile agents causing any harm to Mobile Agent Platform (MAP). Wahbe et al. [11] proposed a Sandboxing technique, which offers an isolated environment (or a restricted area) for the execution of suspected mobile agents. This isolation prevents the mobile agent from accomplishing specific code exercises, for example local file system interaction, and accessing system properties. Noordende et al. [12] proposed a Mansion API where the agents execute in a protected environment like Sandboxing technique. Additionally, the agents are authenticated based on the trust level between agent owners as well as platform owners. Marikkannu et al. [13] suggested a Dual checkpoint mechanism involving two gates, inner and outer for the mobile agent verification consisting of Digital signatures as well as checksum ensuring the validity of a mobile agent. Alfalayleh et al. [14] recommended a Code Signing mechanism in which the sign of originator on code is checked by agent platform for verifying that it has not been modified. Lee et al. [15] proposed a technique in which the agent byte code compiles the proof carried by mobile agent with the platform’s security policy. Upon receipt, the agent platform employs a proof checker for the purpose of checking and verifying the security proof of incoming agent byte code. Ordille [16] proposed the use of Path history that enables the platform either to run N-grams Based Supervised Machine Learning Model for Mobile Agent Platform Protection against Unknown Malicious Mobile Agents
منابع مشابه
Cooperative Control of Mobile Robots in Creating a Runway Platform for Quadrotor Landing
Multi-agent systems are systems in which several agents accomplish a mission in a cooperative manner. In this paper, a novel idea for the construction of a movable runway platform based on multi-agent systems is presented. It is assumed that an aerial agent (quadrotor) decides to make an emergency landing due to reasons such as a decrease in energy level or technical failure, while there is no ...
متن کاملThe J-seal2 Mobile Agent Kernel
Recently a large number of Java [10] based mobile agent systems has emerged. In fact, Java is a good choice for the implementation of execution environments for mobile agents, as it offers many features that ease the development of mobile agent platforms, such as portable code, language safety and classloader namespaces for isolation, serialization for state capture, and multithreading. In addi...
متن کاملA Formal Petri Net Based Model for Antivirus Update Agent System
In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...
متن کاملA Secure Protocol Based on a Sedentary Agent for Mobile Agent Environments
The main challenge when deploying mobile agent environments pertains to security issues concerning mobile agents and their executive platform. This paper proposes a secure protocol which protects mobile agents against attacks from malicious hosts in these environments. Protection is based on the perfect cooperation of a sedentary agent running inside a trusted third host. Results show that the ...
متن کاملEffect of levels of realism of mobile-based pedagogical agents on health e-learning
Background: One of the ways for effective communication between learners and instructional multimedia content in mobile learning systems is taking advantage of characters or pedagogical agents. The present study aimed to investigate the effect of the levels of realism in mobile-based pedagogical agents on health e-learning. Methods: The s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJIMAI
دوره 4 شماره
صفحات -
تاریخ انتشار 2017