A protocol for detecting malicious hosts based on limiting the execution time of mobile agents

被引:14
|
作者
Esparza, O [1 ]
Soriano, M [1 ]
Muñoz, JL [1 ]
Forné, J [1 ]
机构
[1] Tech Univ Catalonia, Barcelona, Spain
关键词
D O I
10.1109/ISCC.2003.1214130
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. In [3] the authors introduced the idea of limiting the execution time in the hosts. Malicious hosts need time to analyze and modify an agent in order to take some profit. Controlling the execution time in the hosts permits detecting manipulation attacks performed by malicious hosts during the agent's execution. This paper present a protocol for detecting malicious hosts based on the idea of execution time limiting.
引用
收藏
页码:251 / 256
页数:6
相关论文
共 50 条
  • [1] A model of attacks of malicious hosts against mobile agents
    Hohl, F
    [J]. OBJECT-ORIENTED TECHNOLOGY: ECOOP'98 WORKSHOP READER, 1998, 1543 : 299 - 299
  • [2] Protecting mobile agents against malicious hosts by intention spreading
    Ng, SK
    Cheung, KW
    [J]. INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, PROCEEDINGS, 1999, : 725 - 729
  • [3] An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking
    Esparza, Oscar
    Munoz, Jose L.
    Tomas-Buliart, Joan
    Soriano, Miguel
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (11): : 1446 - 1462
  • [4] Detecting Mobile Malicious Webpages in Real Time
    Amrutkar, Chaitrali
    Kim, Young Seuk
    Traynor, Patrick
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (08) : 2184 - 2197
  • [5] A Real Time Approach for Detecting Mobile Malicious WebPages
    Deepika, S.
    Mounika, P.
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER VISION AND MACHINE LEARNING, 2019, 1228
  • [6] Host revocation authority:: A way of protecting mobile agents from malicious hosts
    Esparza, O
    Soriano, M
    Muñoz, JL
    Forné, J
    [J]. WEB ENGINEERING, PROCEEDINGS, 2003, 2722 : 289 - 292
  • [7] A Detecting Method for Malicious Mobile Application Based on Incremental SVM
    Li, Yong
    Ma, YuanYuan
    Chen, Mu
    Dai, ZaoJian
    [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1246 - 1250
  • [8] Detecting tenders based on Mobile agents
    Maarouf, Otman
    Madani, Youness
    Erritali, Mohammed
    Elayachi, Rachid
    [J]. 10TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2019) / THE 2ND INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40 2019) / AFFILIATED WORKSHOPS, 2019, 151 : 1114 - 1119
  • [9] Profile-based security against malicious mobile agents
    Li, Hua
    Greene, Glena
    Alonso, Rafael
    [J]. ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2006, 4093 : 1017 - 1024
  • [10] Detecting and blocking malicious traffic caused by IRC protocol based botnets
    Chi, Zhenhua
    Zhao, Zixiang
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 485 - 489