Preventing Attacks on Mobile Agents by Malicious Hosts

نویسنده

  • Nathan Balon
چکیده

The security concerns that come with using mobile agents is the main reason why the mobile agent paradigm has not been widely adopted. A number of new security problems are introduced with the use of mobile agents. Both, the host computer that executes an agent and the agent, need security mechanisms to protect against the threats posed by malicious agents and hosts. The issue of protecting a mobile agent from a malicious host is a more difficult problem than protect a host from a malicious agent. This paper will look at three solutions that have been proposed to protect agents from malicious hosts: creating time-limited black boxes, computing with encrypted functions, and environmental key generation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

POM - A Mobile Agent Security Model against Malicious Hosts

Security, especially the attacks performed by hosts to the visiting mobile agents (the malicious hosts problem), is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agents, the host has full control over them and could easily perform many kinds of attacks against them. This problem has not been full solved yet. After the ...

متن کامل

Effects of Communication Disruption in Mobile Agent Trust Assessments for Distributed Security

A mobile agent is an autonomous agent that is not bound to the system on which it begins execution. Unfortunately, the mobility and interaction inherent in mobile agent technology introduces significant security problems, such as malicious host attacks, which can disable the agent, alter its code, or disrupt its communication. This research explores distributed security solutions based on coope...

متن کامل

Protection of a mobile agent with a reference clone

Many areas such as electronic commerce, network management and information retrieval can benefit from the application of mobile agents technologies. The exploitation of mobile agents offers several advantages such as reduction of network latency, asynchronous execution, fault-tolerant behavior. However, a wider use of mobile agents is currently limited by the lack of a comprehensive security fr...

متن کامل

Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree

Threat diagnostic, using AND/OR tree and risk analysis, is a mechanism to protect mobile agents against malicious host attacks. The method is based on analyzing the probable causes of mobile agent failure to perform its intended function. It uses the symptoms of different types of malicious host attacks and arranges them in a logical order depending on the expected outcomes. We provide a method...

متن کامل

Establishing a Secure Open-Environment for Using Mobile Agents in Electronic Commerce

Although mobile agents are a promising technology, the large-scale deployment of agents and the existence of hosts running agencies will not happen until proper security mechanisms are well understood and implemented. When considering global open environments as the Internet, mobile agents can be the victims of attacks by malicious hosts. In this paper, we present a security framework that prot...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005