Intelligent versus Malicious Agent: A Comparative Study

نویسندگان

  • Dost Muhammad Khan
  • Nawaz Mohamudally
چکیده

The agent can be categorized into two types; one is known as an intelligent agent and the second is malicious agent, called computer viruses. These types of agents have some common characteristics; both are intelligent by nature and both have the properties reproduction and transfer from one host to another host in the network, called transferability. The fundamental difference between these agents is that the intelligent agent uses deliberate transport infrastructure while the malicious agent hijacks the resources. The intelligent agents are used in a distributed environment because they are not cumbersome for the network traffic; they overcome network latency, operate in heterogeneous environment and possess fault-tolerant behavior, on the other hand the malicious agents are inefficient and wasteful for computer network resources. This is a discussion paper; we present a comparative study of intelligent and malicious agent and also draw a comparison between an intelligent agent and a distributed object.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preventing Attacks on Mobile Agents by Malicious Hosts

The security concerns that come with using mobile agents is the main reason why the mobile agent paradigm has not been widely adopted. A number of new security problems are introduced with the use of mobile agents. Both, the host computer that executes an agent and the agent, need security mechanisms to protect against the threats posed by malicious agents and hosts. The issue of protecting a m...

متن کامل

An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection

We report in this paper on research in progress concerning the integration of different security techniques. A main purpose of the project is to integrate as many security functionality as possible into the firewall. We will report in this paper on the concept of an intelligent firewall that contains a smart detection engine for potentially malicious data packets.

متن کامل

SINS: A Middleware for Autonomous Agents and Secure Code Mobility

Building trusted applications is hard, especially in a distributed or mobile setting. Existing methods and tools are inadequate to deal with the multitude of challenges posed by distributed application development. The problem is exacerbated in a hostile environment such as the Internet where, in addition, applications are vulnerable to malicious attacks. It is widely acknowledged that intellig...

متن کامل

Effects of Communication Disruption in Mobile Agent Trust Assessments for Distributed Security

A mobile agent is an autonomous agent that is not bound to the system on which it begins execution. Unfortunately, the mobility and interaction inherent in mobile agent technology introduces significant security problems, such as malicious host attacks, which can disable the agent, alter its code, or disrupt its communication. This research explores distributed security solutions based on coope...

متن کامل

Reputation-Based Dynamic Trust Evaluation Model for multi-agent Systems based on service satisfaction

Trust and security issues have become critically important with the fast expansion of multi-agent system. Many computer applications such as the E-business systems, Agent-to-Agent, Grid and Semantic Web can be viewed as multi-agent systems which are open, anonymous and dynamic in nature. By its nature of multi-agent systems, malicious agents are always seeking to spread malicious content in the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012