Intelligent versus Malicious Agent: A Comparative Study
نویسندگان
چکیده
The agent can be categorized into two types; one is known as an intelligent agent and the second is malicious agent, called computer viruses. These types of agents have some common characteristics; both are intelligent by nature and both have the properties reproduction and transfer from one host to another host in the network, called transferability. The fundamental difference between these agents is that the intelligent agent uses deliberate transport infrastructure while the malicious agent hijacks the resources. The intelligent agents are used in a distributed environment because they are not cumbersome for the network traffic; they overcome network latency, operate in heterogeneous environment and possess fault-tolerant behavior, on the other hand the malicious agents are inefficient and wasteful for computer network resources. This is a discussion paper; we present a comparative study of intelligent and malicious agent and also draw a comparison between an intelligent agent and a distributed object.
منابع مشابه
Preventing Attacks on Mobile Agents by Malicious Hosts
The security concerns that come with using mobile agents is the main reason why the mobile agent paradigm has not been widely adopted. A number of new security problems are introduced with the use of mobile agents. Both, the host computer that executes an agent and the agent, need security mechanisms to protect against the threats posed by malicious agents and hosts. The issue of protecting a m...
متن کاملAn Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection
We report in this paper on research in progress concerning the integration of different security techniques. A main purpose of the project is to integrate as many security functionality as possible into the firewall. We will report in this paper on the concept of an intelligent firewall that contains a smart detection engine for potentially malicious data packets.
متن کاملSINS: A Middleware for Autonomous Agents and Secure Code Mobility
Building trusted applications is hard, especially in a distributed or mobile setting. Existing methods and tools are inadequate to deal with the multitude of challenges posed by distributed application development. The problem is exacerbated in a hostile environment such as the Internet where, in addition, applications are vulnerable to malicious attacks. It is widely acknowledged that intellig...
متن کاملEffects of Communication Disruption in Mobile Agent Trust Assessments for Distributed Security
A mobile agent is an autonomous agent that is not bound to the system on which it begins execution. Unfortunately, the mobility and interaction inherent in mobile agent technology introduces significant security problems, such as malicious host attacks, which can disable the agent, alter its code, or disrupt its communication. This research explores distributed security solutions based on coope...
متن کاملReputation-Based Dynamic Trust Evaluation Model for multi-agent Systems based on service satisfaction
Trust and security issues have become critically important with the fast expansion of multi-agent system. Many computer applications such as the E-business systems, Agent-to-Agent, Grid and Semantic Web can be viewed as multi-agent systems which are open, anonymous and dynamic in nature. By its nature of multi-agent systems, malicious agents are always seeking to spread malicious content in the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012