Addressing Mobile Agent Security through Agent Collaboration


Evens Jean, Yu Jiao, Ali R Hurson, Journal of Information Processing Systems Vol. 3, No. 1, pp. 43-53, Feb. 2007  


Keywords: Disk Striping, Multimedia System, Bandwidth
Fulltext:

Abstract

The use of agent paradigm in today¡¯s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Evens Jean, Yu Jiao, & Ali R Hurson (2007). Addressing Mobile Agent Security through Agent Collaboration. Journal of Information Processing Systems, 3(1), 43-53. DOI: .

[IEEE Style]
E. Jean, Y. Jiao and A. R. Hurson, "Addressing Mobile Agent Security through Agent Collaboration," Journal of Information Processing Systems, vol. 3, no. 1, pp. 43-53, 2007. DOI: .

[ACM Style]
Evens Jean, Yu Jiao, and Ali R Hurson. 2007. Addressing Mobile Agent Security through Agent Collaboration. Journal of Information Processing Systems, 3, 1, (2007), 43-53. DOI: .