Addressing Mobile Agent Security through Agent Collaboration

Evens Jean, Yu Jiao and Ali R Hurson
Volume: 3, No: 2, Page: 43 ~ 53, Year: 2007

Keywords: Disk Striping, Multimedia System, Bandwidth
Full Text:

Abstract
The use of agent paradigm in today¡¯s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.

Article Statistics
Multiple requests among the same broswer session are counted as one view (or download).
If you mouse over a chart, a box will show the data point's value.


Cite this article
IEEE Style
Evens Jean, Yu Jiao, and Ali R Hurson, "Addressing Mobile Agent Security through Agent Collaboration," Journal of Information Processing Systems, vol. 3, no. 2, pp. 43~53, 2007. DOI: .

ACM Style
Evens Jean, Yu Jiao, and Ali R Hurson, "Addressing Mobile Agent Security through Agent Collaboration," Journal of Information Processing Systems, 3, 2, (2007), 43~53. DOI: .