Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree

نویسندگان

  • Magdy Saeb
  • Meer Hamza
  • Ashraf Soliman
چکیده

Threat diagnostic, using AND/OR tree and risk analysis, is a mechanism to protect mobile agents against malicious host attacks. The method is based on analyzing the probable causes of mobile agent failure to perform its intended function. It uses the symptoms of different types of malicious host attacks and arranges them in a logical order depending on the expected outcomes. We provide a methodical definition of attacks against mobile agents. This approach allows defining a protection scheme that is used to protect mobile agents. The objectives of this paper are twofold: Firstly, to provide information regarding the current methods of protecting mobile agents, Secondly, identify the different types of malicious hosts attacks based on their symptoms. Finally, we introduce our approach based on criticality analysis to identify the most critical type of attack and its associated expected failure cost.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preventing Attacks on Mobile Agents by Malicious Hosts

The security concerns that come with using mobile agents is the main reason why the mobile agent paradigm has not been widely adopted. A number of new security problems are introduced with the use of mobile agents. Both, the host computer that executes an agent and the agent, need security mechanisms to protect against the threats posed by malicious agents and hosts. The issue of protecting a m...

متن کامل

Secure Communication Protocol for Protecting Computation Result of Free Roaming Mobile Agent

Mobile agent plays an important role in developing applications of open, distributed and mixed environments, such as the internet. Mobile agent or mobile software agent is piece of software that can operate autonomously to accomplish user assigned task. To explain more, mobile agent is the process which can migrate to hosts autonomously. As an agent travels to do execution in different environm...

متن کامل

Protecting a Mobile Agent's Route against Collusions

In the world of mobile agents, security aspects are extensively being discussed, with strong emphasis on how agents can be protected against malicious hosts and vice versa. This paper discusses a method for concealing an agent's route information from being misused by sites en route to collect proole information of the agent's owner. Furthermore , it is shown that the protected route resists at...

متن کامل

A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts

Mobile agents have been considered a promising technology to develop e-commerce applications, however the security concerns about the technology have stopped its widespread use. The identified security areas comprise protecting hosts against malicious agents, protecting the agent’s transmission and protecting agents against malicious hosts. The first two security issues and the protection of th...

متن کامل

Several Structures for Protecting the Routes of Mobile Agents Dispatched in Parallel

For mobile agents to be effective in practice, they have to be securely and efficiently deployed. In this paper, we propose and discuss several route structures and methods for mobile agents that are dispatched in parallel. These schemes can protect the route information against malicious hosts and facilitate the dispatching of a large number of agents in parallel efficiently. Under noncollusio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002