Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree
نویسندگان
چکیده
Threat diagnostic, using AND/OR tree and risk analysis, is a mechanism to protect mobile agents against malicious host attacks. The method is based on analyzing the probable causes of mobile agent failure to perform its intended function. It uses the symptoms of different types of malicious host attacks and arranges them in a logical order depending on the expected outcomes. We provide a methodical definition of attacks against mobile agents. This approach allows defining a protection scheme that is used to protect mobile agents. The objectives of this paper are twofold: Firstly, to provide information regarding the current methods of protecting mobile agents, Secondly, identify the different types of malicious hosts attacks based on their symptoms. Finally, we introduce our approach based on criticality analysis to identify the most critical type of attack and its associated expected failure cost.
منابع مشابه
Preventing Attacks on Mobile Agents by Malicious Hosts
The security concerns that come with using mobile agents is the main reason why the mobile agent paradigm has not been widely adopted. A number of new security problems are introduced with the use of mobile agents. Both, the host computer that executes an agent and the agent, need security mechanisms to protect against the threats posed by malicious agents and hosts. The issue of protecting a m...
متن کاملSecure Communication Protocol for Protecting Computation Result of Free Roaming Mobile Agent
Mobile agent plays an important role in developing applications of open, distributed and mixed environments, such as the internet. Mobile agent or mobile software agent is piece of software that can operate autonomously to accomplish user assigned task. To explain more, mobile agent is the process which can migrate to hosts autonomously. As an agent travels to do execution in different environm...
متن کاملProtecting a Mobile Agent's Route against Collusions
In the world of mobile agents, security aspects are extensively being discussed, with strong emphasis on how agents can be protected against malicious hosts and vice versa. This paper discusses a method for concealing an agent's route information from being misused by sites en route to collect proole information of the agent's owner. Furthermore , it is shown that the protected route resists at...
متن کاملA Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts
Mobile agents have been considered a promising technology to develop e-commerce applications, however the security concerns about the technology have stopped its widespread use. The identified security areas comprise protecting hosts against malicious agents, protecting the agent’s transmission and protecting agents against malicious hosts. The first two security issues and the protection of th...
متن کاملSeveral Structures for Protecting the Routes of Mobile Agents Dispatched in Parallel
For mobile agents to be effective in practice, they have to be securely and efficiently deployed. In this paper, we propose and discuss several route structures and methods for mobile agents that are dispatched in parallel. These schemes can protect the route information against malicious hosts and facilitate the dispatching of a large number of agents in parallel efficiently. Under noncollusio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002