A protocol for detecting malicious hosts based on limiting the execution time of mobile agents

被引:14
|
作者
Esparza, O [1 ]
Soriano, M [1 ]
Muñoz, JL [1 ]
Forné, J [1 ]
机构
[1] Tech Univ Catalonia, Barcelona, Spain
关键词
D O I
10.1109/ISCC.2003.1214130
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. In [3] the authors introduced the idea of limiting the execution time in the hosts. Malicious hosts need time to analyze and modify an agent in order to take some profit. Controlling the execution time in the hosts permits detecting manipulation attacks performed by malicious hosts during the agent's execution. This paper present a protocol for detecting malicious hosts based on the idea of execution time limiting.
引用
收藏
页码:251 / 256
页数:6
相关论文
共 50 条
  • [21] Identity-Based Detecting Protocol for Mobile Agent with Onion Itinerary
    Jing, Wang
    Yue, Wu Shu
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 12 - 14
  • [22] MAAC Protocol: Mobile Agents based Address Auto-Configuration Protocol for MANET
    Korichi, Afaf
    Zafoune, Youcef
    [J]. 2018 INTERNATIONAL CONFERENCE ON SMART COMMUNICATIONS IN NETWORK TECHNOLOGIES (SACONET), 2018, : 194 - 199
  • [23] Region-based stage construction protocol for fault tolerant execution of mobile agent
    Choi, S
    Baik, M
    Kim, H
    Yoon, J
    Shon, J
    Hwang, C
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 499 - 502
  • [24] Efficient multicast routing protocol for mobile hosts in IPv6 based networks
    Yang, SJ
    Oh, HK
    Park, SH
    [J]. ELECTRONICS LETTERS, 2002, 38 (16) : 936 - 938
  • [25] A Distributed k-Anycast Routing Protocol Based on Mobile Agents
    Xu, Xin
    Gu, Yun-li
    Du, Jie
    Qian, Huan-yan
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3847 - +
  • [26] A proxy-based communication protocol for mobile agents: Protocols and performance
    Zhou, XY
    Arnason, N
    Ehikioya, SA
    [J]. 2004 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2004, : 53 - 58
  • [27] k-anycast routing protocol based on component and mobile agents
    Xu, Xin
    Gu, Yun-Li
    Qian, Huan-Yan
    [J]. Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2010, 34 (02): : 232 - 237
  • [28] Detecting bad information in mobile wireless networks based on the wireless application protocol
    Zhang, Weizhe
    Zhang, You
    Kim, Tai-Hoon
    [J]. COMPUTING, 2014, 96 (09) : 855 - 874
  • [29] Detecting bad information in mobile wireless networks based on the wireless application protocol
    Weizhe Zhang
    You Zhang
    Tai-Hoon Kim
    [J]. Computing, 2014, 96 : 855 - 874
  • [30] IDMA: Improving the defense against malicious attack for Mobile Ad Hoc Networks based on the ARIP protocol
    Peng, Chaorong
    Chen, Chang Wen
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2008, 2008, 6982