Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts
نویسندگان
چکیده
Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. The approach that is presented here detects manipulation attacks performed during the agent’s execution. Software watermarking techniques are used in order to embed a mark into the agent. The agent’s execution creates marked results. When the agent returns to the origin host, these results are examined in order to find the embedded mark. If the mark has changed, this means that the executing host has modified the agent. Colluding hosts can also be identified by using codes with the identifiable parent property (IPP) as marks, i.e. mobile agent fingerprinting.
منابع مشابه
An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. In such scenario there are some security issues that must be considered. In particular, this article deals with the protection of mobile agents against manipulation attacks performed by the host, which is one of the main security issues to solve in mobile ...
متن کاملPreventing Attacks on Mobile Agents by Malicious Hosts
The security concerns that come with using mobile agents is the main reason why the mobile agent paradigm has not been widely adopted. A number of new security problems are introduced with the use of mobile agents. Both, the host computer that executes an agent and the agent, need security mechanisms to protect against the threats posed by malicious agents and hosts. The issue of protecting a m...
متن کاملPOM - A Mobile Agent Security Model against Malicious Hosts
Security, especially the attacks performed by hosts to the visiting mobile agents (the malicious hosts problem), is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agents, the host has full control over them and could easily perform many kinds of attacks against them. This problem has not been full solved yet. After the ...
متن کاملPath-Based Security for Mobile Agents
As mobile agents are increasingly adopted in intranets, on the Internet, and on computational grids, new security concerns become increasingly important. Unlike other kinds of mobile code, such as applets, which are pulled a single time to remote systems (single-hop), mobile agents may move using their own itinerary through a series of systems (multiple-hop), potentially carrying sensitive info...
متن کاملContent adaptive watermarking for multimedia fingerprinting
This paper presents a feasible system for multimedia fingerprinting. One of the important problems of fingerprinting is watermarking strategies for the fingerprints, in other words, where to embed and how to embed. We address these two major problems of fingerprint-watermarking for multimedia in the proposed content-adaptive watermarking scheme. First, the fingerprint codes are often very long ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003