Preventing Attacks on Mobile Agents by Malicious Hosts
نویسنده
چکیده
The security concerns that come with using mobile agents is the main reason why the mobile agent paradigm has not been widely adopted. A number of new security problems are introduced with the use of mobile agents. Both, the host computer that executes an agent and the agent, need security mechanisms to protect against the threats posed by malicious agents and hosts. The issue of protecting a mobile agent from a malicious host is a more difficult problem than protect a host from a malicious agent. This paper will look at three solutions that have been proposed to protect agents from malicious hosts: creating time-limited black boxes, computing with encrypted functions, and environmental key generation.
منابع مشابه
POM - A Mobile Agent Security Model against Malicious Hosts
Security, especially the attacks performed by hosts to the visiting mobile agents (the malicious hosts problem), is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agents, the host has full control over them and could easily perform many kinds of attacks against them. This problem has not been full solved yet. After the ...
متن کاملEffects of Communication Disruption in Mobile Agent Trust Assessments for Distributed Security
A mobile agent is an autonomous agent that is not bound to the system on which it begins execution. Unfortunately, the mobility and interaction inherent in mobile agent technology introduces significant security problems, such as malicious host attacks, which can disable the agent, alter its code, or disrupt its communication. This research explores distributed security solutions based on coope...
متن کاملProtection of a mobile agent with a reference clone
Many areas such as electronic commerce, network management and information retrieval can benefit from the application of mobile agents technologies. The exploitation of mobile agents offers several advantages such as reduction of network latency, asynchronous execution, fault-tolerant behavior. However, a wider use of mobile agents is currently limited by the lack of a comprehensive security fr...
متن کاملProtecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree
Threat diagnostic, using AND/OR tree and risk analysis, is a mechanism to protect mobile agents against malicious host attacks. The method is based on analyzing the probable causes of mobile agent failure to perform its intended function. It uses the symptoms of different types of malicious host attacks and arranges them in a logical order depending on the expected outcomes. We provide a method...
متن کاملEstablishing a Secure Open-Environment for Using Mobile Agents in Electronic Commerce
Although mobile agents are a promising technology, the large-scale deployment of agents and the existence of hosts running agencies will not happen until proper security mechanisms are well understood and implemented. When considering global open environments as the Internet, mobile agents can be the victims of attacks by malicious hosts. In this paper, we present a security framework that prot...
متن کامل