Framework for Securing Mobile Software Agents

نویسندگان

  • Jeffy Mwakalinga
  • Louise Yngström
چکیده

Information systems are growing in size and complexity making it infeasible for human administrators to manage them. The aim of this work is to study ways of securing and using mobile software agents to deter attackers, protect information systems, detect intrusions, automatically respond to the intrusions and attacks, and to produce recovery services to systems after attacks. Current systems provide intrusion detection, prevention, protection, response, and recovery services but most of these services are manual and the reaction time is usually from a number of hours to days depending on the complexity of the systems. There are efforts of using mobile software agents to provide these services automatically, thereby reducing reaction time, but the technology is not widely accepted due to security issues of mobile agents. In this work, we have created a framework for securing mobile software agents in information systems. Communication security between platforms, protection of the baggage carried by agents, and protection of agents are provided. The framework has five components: deterrence, protection, detection, response and recovery sub-systems. The framework has been partially implemented and has an interface for administrators, monitored systems, NIST vulnerability database, patches‘ database, sensors, and Secure Mobile agents Run-Time System. This framework provides security for mobile agents at different levels and this increases trust in agents‘ technology. The response time, after intrusions are detected, is shortened. The framework helps systems to adapt by improving the performance of new generations of agents.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Securing Network Management Agent Distribution and Communication

Network Management applications using distributed software agents require secure techniques for agent distribution and communication. Although there are several popular mobile agent environments written in the Java programming language that contend to offer these functions, these packages are generally heavy weight and do not provide a framework for authenticating agent responsibilities within ...

متن کامل

Securing Mobile Agents for Electronic Commerce: An Experiment

1. INTRODUCTION Mobile agents are autonomous software agents that travel in a computer network to execute and perform tasks on different hosts for their owners. Several reasons for deploying mobile agents have been suggested, such as [1]: a) they reduce the network load; b) they overcome network latency; c) they encapsulate protocols; d) they execute asynchronously and autonomously; e) they ada...

متن کامل

Migration control for mobile agents based on passport and visa

Research on mobile agents has attracted much attention as this paradigm has demonstrated great potential for the next-generation e-commerce. Proper solutions to security-related problems become key factors in the successful deployment of mobile agents in e-commerce systems. We propose the use of passport and visa (P/V) for securing mobile agent migration across communities based on the SAFER e-...

متن کامل

Mobile Agents Systems in Wireless Applications

The paper presents an introduction in the Mobile Agents Systems and describes how this technology can be used in wireless applications. Also it is shown the possibility of securing wireless applications that use mobile agents and distributed computing. Wireless networks are a relatively new technology in the LAN market. With the weak encryption and security defined in the IEEE standards, wirele...

متن کامل

Mobile Wireless Network and Intrusion Detection

An intrusion detection system framework for mobile wireless network is designed to support heterogeneous network environments to identify intruders at its best. The landscape of network security has drastically changed due to the rapid increase of wireless networks and mobile computing applications. Firewalls and encryption software methods have now become outdated for securing networks and are...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006