Malicious Host and Problem of Blocking for Mobile Agent: Proposed Solution

نویسنده

  • Heman Pathak
چکیده

Mobile Agent (MA) is a software programs that lives in computer networks, performing its computations and moving from host to host as necessary to fulfil user goals. Autonomous behaviour of MA and the malicious environment of the internet give rise to various important security issues related with both MA and its host. Various researchers working in the areas have identified various threats and their effects. During its life cycle a MA moves from one host to other. If MA is malicious or if the executing environment i.e. host is malicious they both can influence each other and can harm in many ways. If the MA wishes to visit a host which has been detected as malicious then it should not migrate to that host. In this case MA will be blocked at its current location. This paper discusses the problem of blocking for MA for malicious host and proposes a group based layered architecture to mask the malicious host from rest of the network. Proposed architecture is centralized at one level and distributed at other. It divides the open network like internet into regions and hosts in each region are then grouped on the basis of services they offered. One of the host acts as group in-charge. This group appears as a single host to the other parts of the network. In case, a host is found malicious, load of that host is distributed among other trusted group members and recovery procedure for host started.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preventing Attacks on Mobile Agents by Malicious Hosts

The security concerns that come with using mobile agents is the main reason why the mobile agent paradigm has not been widely adopted. A number of new security problems are introduced with the use of mobile agents. Both, the host computer that executes an agent and the agent, need security mechanisms to protect against the threats posed by malicious agents and hosts. The issue of protecting a m...

متن کامل

Modeling Fault-Tolerant and Reliable Mobile Agent Execution in Distributed Systems

The reliable execution of a mobile agent is a very important design issue in building a mobile agent system and many fault-tolerant schemes have been proposed so far. To further develop mobile agent technology, reliability mechanisms such as fault tolerance and transaction support are required. For this purpose, we first identify two basic requirements for fault-tolerant mobile agent execution:...

متن کامل

Security Approaches For Mobile Multi-Agent System

Mobile Computing is the current area of research. Many researchers trying to do research in this filed. In mobile Computing the mobile agents are the very important thing. When different mobile agents work in the same environment simultaneously it becomes a very important issue. Mobile agents have automatic, pro-active, and dynamic problem solving behaviors. However, scope of this paper is limi...

متن کامل

Cryptography Based Hybrid Security Architecture for Mobile Multi Agents

Distributed Computing is the current area of research. Many researchers are working in area of Distributed Computing and trying to find a solution for the security and other issues. In Distributed Computing the mobile agents are the very important thing. When different mobile agents work in the same environment simultaneously it becomes a very important issue. Mobile agents have automatic, pro-...

متن کامل

A Collusion-Resistant Distributed Signature Delegation Based on Anonymous Mobile Agent

This paper presents a novel method that allows an agent host to delegate its signing power to an anonymous mobile agent in such away that the mobile agent does not reveal any information about its host’s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service provision. The solution introduces a verification server to verify the signature ge...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014