SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013

PROTECT MOBILE AGENT AGAINST MALICIOUS
HOST USING PARTIAL-MOBILITY MECHANISM
Tarig Mohamed Ahmed
Faculty of Mathematical Sciences, University of Khartoum, Sudan

ABSTRACT
A mobile agent is a promising area in distributed systems. It is a new technology for computers to
communicate. Despite the multiple benefits of the mobile agent, but there are several obstacles to its
spread. The mobile agent protection is one of these obstacles. In this paper a new mechanism has been
proposed to protect mobile. The mechanism is called Partial-Mobility Mechanism (PMM). The main idea
behind this mechanism is to allow to mobile agents to visit malicious hosts partially by using a One-HopAgent (OHA). OHA is a type of the mobile agent that contains only a task that will be executed in a
malicious host. By avoiding the mobile agent to visit the malicious host, PMM completely protects the
mobile agent’s secrecy and integrity. PMM has been implemented using .Net framework and C#
technologies. Some experiments have been conducted to test the feasibility and performance of the
mechanism. Full analysis of the results have been presented and discussed.

KEY WORD
Mobile Agent, Mobility, Security, Privacy

1. INTRODUCTION
Mobile agents (MAs) are independent objects capable to achieve tasks in heterogeneous networks
on behaved of users. Based on user’s requests, the MAs start their journey and move
autonomously among hosts. The users need a very short time of connection to network in order to
dispatch MAs and after that they can go offline. This a big win in terms of reducing the
communication cost. The MAs is working based on a concept of remote programming and
asynchronous communication mode. So, the problem of the network interruptions and the
network latencies are avoided. Based on these features, MAs could be used in many applications
of distributed systems, for example, networks maintenance, applications deployments,
information retrieval ...etc.
The MA’s body consists of three parts: first part is a code which represents the behavior or tasks
of the MA that will be executed in the hosts. The second part represents the MA’s data space
which is updated according the execution of the first part. The third part is the execution state that
keeps a execution start point in each host. The key feature of MAs system is a mobility that
allows MAs to move among network nodes. There are two types of the mobility: the first is called
strong mobility which allows MAs to move with code the three parts. When the MA arrives to
next station during the journey, it will start the execution using its execution state. The second
type is a weak mobility which allows to MA to move with the code and the data only. In this type,
DOI:10.5121/ijfcst.2013.3604

41
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013

the tasks will be executed similarly in all nodes but the data may change. Communication
methods in MA systems are available between MAs themselves, MAs and their users or between
the MA and the hosts. The communication provides some kind of information exchange between
different entities. As general the message passing concepts are used in the MA systems.
A security is one of the major important issues that should be carefully planned when developing
a MA model. The model must protect all parties in the system such as: MAs, Hosts, the mobility
and communications. This area has taken a wide range of researchers’ attention. And it could be
classified as one of the biggest challenges. The importance of the security comes from the nature
of the MAs itself; that contains distributed entities any gape of security will affect overall the
system. The MA needs a protection against other malicious MAs and hosts. The host needs a
protection against malicious MAs. Also, the channels of the mobility and the communication
should be secured. Gary [4] has defined these security areas in details. This paper deals with MAs
protection against malicious hosts. The MA may face many risks form hosts such as stealing
sensitive information like credit cards’ numbers, attacking the integrity of the MAs, preventing
the MA to continue its journey...etc. All these possible attack have been resolved by PMM. This
mechanism is completely protected the MA against malicious hosts. A full description of the
mechanism will be presented later. As road map of the paper: section 2 presents some recent
researches related to the MA protection. Section 3 provides full description of PMM. Section 4
presents some experiments related to PMM’s feasibility and performance with results discussion.
Finally, section 5 concludes this paper and giving some recommendations as future works.

2.RELATED WORK
Many risks surround The MAs system. It is important to find a way that could mitigate these
risks. The following points represent some of them [5]:
- Eavesdropping: Try to attack the secret or sensitive information in the MA. For example,
information that is collected from others hosts or Credit Card Number.
- Intercepting and altering: this type of attack affects the behavior of the MA by making some
modification of the MAs’ tasks, the itinerary table or results that collected hosts for example.
- Reply: illegally sending a MA’s copy to perform a malicious action.
- Masquerade: An entity of MA’s system pretends to be a different entity.
- Capturing: Hosts or service provides may capture the MAs and prevent them to continue their
journeys.
This area of security has taken grade attention from the researches and some valuable
mechanisms have been proposed to protect the MAs against malicious hosts. [6, 7]:
Self-Modifying Code Mechanism: This mechanism proposes an obfuscation algorithm based on
self-modifying code to prevent attacks against a MA’s code at function level. The mechanism’s
algorithm has been implements and it proves the efficacy [20].
Host Revocation Authority: The main idea of this mechanism is to use a Trusted Third Party, the
Host Revocation Authority. The HoRA plays an important role by controlling malicious actions
that are done by the hosts in the past. The MA’s sender must consult the HoRA before sending

42
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013

the MAs to the hosts with bad history [8]. This mechanism fails to protect the MA against
malicious hosts in case no history related to that hosts.
A Secure Mobile Agents Platform: By using access control and authentication, this mechanism
protects the MAs. The host controls all the resources available on it. Each MA defines its own
control policy for other MAs by using an Interface Definition Language (IDL) [9].
Execution Tracing: Gary [10] proposes to detect the malicious actions from the MAs after
returning home. Vigna [11] proposes a mechanism to detect the attack by using cryptographic
traces and looking to the MAs history file (log) where the MA’s user will know if the MA has
achieved its duties correctly or not [12]. In this mechanism the MA must maintain large log
information and this is a drawback. Also, a secure protocol is required for transferring
cryptography hashes for external entities.
Obfuscated Code: The main idea behind this mechanism is to create a Black Box out of an
original MA to execute the same task of the MA as an original MA, but by different arrangement
[13]. Obfuscated Code has disadvantages, for example, no black-box algorithms exist that work
for arbitrary data. Sander and Tschudin [14] used cryptography in their approach in special cases
by having the MA’s program computes not the original, but an encrypted version of it. The result
of this function is decrypted by the MA’s user. But, cryptography theory has not a schema that
computes arbitrary function in a non-interactive manner.
The Ajanta mechanism: This mechanism proposes three approaches for protecting the MA [15].
The first is to allow the programmer to define parts of the MA’s state as Read-Only and if any
modification occurs to these parts, the MA’s user can detect using the digital signature
mechanism. The second approach is let the MA creates append-only data states container where
the data stored in this container can not be deleted or altered without detection by MA’s user. The
third approach is to let programmers to define data states to specific hosts and no other hosts can
deal with these data states. These mechanisms use the encryption, the decryption and the digital
signature.
Partial Result Encapsulation: This mechanism detects attacks by using encapsulating the results
of MA actions at each host, for subsequent verification or when it returns to the home [16]. The
disadvantage of this mechanism, for example, does nothing to ensure MA’s privacy. Also, the
results to encapsulate may not be immediately clear.
Environment Key Generation mechanism: When some environment condition is occurred, this
mechanism allows the MA to take an action. A key is generated is used to unlock some
executable code that was encrypted [17]. This approach has weakness such as: the control of the
MA could simply modify. The host limits the capability to execute a MA’s code that not related
dynamically, sense it is considered an unsafe operation. The mechanism is connected with other
protection mechanism.
KeyLets mechanism: This mechanism based on partitioning a MA as units according to the task
type [18]. By using secret keys, it encrypts each unit to protect them. The distribution of keys to
different hosts is done through the execution of specific type of a MA that is termed a Keylet. The
disadvantages of this approach: Propagation requires a third party code producer that can supply
the MA by a template the MA’s owner. Also, a large number of transactions related to the keylet
43
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013

and a host may not be willing to support the increased of computation. Moreover, key revocation
is not good in quality. In addition, it requires a complicated mechanism to categorize tasks of the
MA. Also, this mechanism does not protect the MA code completely.

3.PARTIAL-MOBILITY MECHANISM
Partial-Mobility Mechanism (PMM) is a new mechanism to protect MAs integrity and privacy
against malicious hosts. In PMM the MA has two types: the first one is an One_Hop_Agent
(OHA) which can visit only one host. The second is a Multi-Hop-Agent (MHA) which can visit
multiple hosts. The MHA can contain multiple of OHAs. The main idea behind PMM is to allow
to the One-Hop-Agent to visit untrusted hosts only. So, the MA will not visit any host that is
classified as untrusted host. In PMM, all hosts will be visit by MAs are classified in two
categories, trusted and untrusted hosts. Now, a full detail of PMM is described as follows:

3.1 MA in PMM
In PMM the MA has two types: OHA which represents the task that will be executed in an
untrusted host. OHA is valid to work in only one host. OHA consists of three main parts: part
one, Data-Input which represents the inputs data that for the task that will be implemented in the
untrusted host. Part two, Task which represents the task required from the untrusted host. Part
three, Output-Info that represents the results after executing the task in the untrusted host. There
is also other information related to system like mobility’s information. Figure 1 presents OHA.

TASK

Input-Data

Input-Data

Figure 1 One-Hop-Agent (OHA)

The second type is MHA which can visit multiple hosts. The MHA consists of different items
such as: an itinerary table, Tasks for each host, Data State (in PMM, strong mobility is used),
Data and OHA’s table. The OHA’s table contains one task per each untrusted host. Figure 2
presents MHA.

OHA1

OHA2

…

OHAn

Task1

Task2

…

Taskm

Figure 2 Multi-Hop Agent (MHA)
44
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013

Also, MHA has additional information related to communication, security, execution state…etc.
Based on user’s request, a MA is created. Suppose the MA will visit N hosts. If M (0<M <N)
hosts are classified as untrusted hosts. In this case, the MA will contain N-M tasks which
represent the tasks in trusted hosts in the MHA. For untrusted hosts, M tasks for OHAs will be
created and embedded in the MHA.

3.2 Mobility in PMM
In PMM the strong mobility is used. As mentioned above, in PMM there are two types of MAs,
MHA which represents the tasks that will be executed in trusted hosts and OHA which represents
a task that will be executed in an untrusted host. To represent one MA, PMM needs only one
MHA and at least one OHA which embedded in MHA.
The mobility in PMM has two ways. The first one is related MHA which the MA movies
normally among hosts using the itinerary table. But, if the next station of the MA is an untrusted
host, the second way of the mobility will be used. It is related to OHA. The MHA will not visit
the untrusted host, instead of that; the specified OHA will visit the untrusted host. The security of
PMM comes from this point that the MHA which contain the all tasks and others OHAs are not
allowed to visit any host that classified as untrusted host. By this way, the MAs are completely
protected against malicious hosts. Figure 3 presents mobility mechanism in PMM.

1
MHA

OHA

MHA

2

OHA

OHA

3
Trusted
Host1

Trusted

OHA
Untrusted

Host2

Host3

4
MHA
3
Trusted
Host4
Figure 3 the mobility mechanism in PMM

45
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013

As seen in figure 3, the hosts are classified as trusted and untrusted hosts. If the trusted host is a
next station in the itinerary table, the MAH will movie to that host. On the other hand, if the next
host is untrusted the OHA will move to that host. By this approach, untrusted host will never deal
with content of the MA.

3.2 PMM implementation
Base on above PMM concepts, a full MA’s system has been developed using C# language
and Dot Net Framework as application platform. The system consists from different entities
such as following:
a. MA’s Home
MA’s home plays important role in the system. It creates the MA’s according to
users’ requests. This entity identifies all hosts that will be visit by the MA. There is a
C#’s class to represent the MAs. By using the class, the MA object is created.
b. MA’s Server
This entity aims to receive the MAs after finishing their journeys. It connects to MSAccess 2007 as a database to store all information that has been collected by the
MAs. The server can receive many MAs simultaneously. After MAs arriving to this
place, the server extracts and stores the information in the database.
c. Hosts
The hosts are classified into two classes: trusted and untrusted hosts. These hosts as
general provide the MAs by services. The main different between two classes is in
dealing with MAs. The trusted can receive and serve only MHAs and the other can
receive and serve only OHAs. Also, the trusted hosts can generate OHAs based on
the task required to implemented in case the next station is an untrusted host.
Figure 4 presents the architecture of the PM system.

46
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013

1

OHA

MHA

MHA

2

OHA

OHA

3
Trusted

Trusted

Host1

OHA
Untrusted

Host2

Host3

MHA

3

Trusted
Host N

MHA

HOME

Database

Figure 4 PM architecture

4. EXPERIMENTS
To test the feasibility and the performance of PM many experiments have been done using the
PMM’s implementation as following:
a) At first, a MA has been generated to visits 50 hosts all hosts are assigned to be trusted
hosts. The hosts have been selected randomly to create the itinerary table. This process is
47
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013

repeated 10 times and in each turn, the itinerary table is created randomly. After MA
completes the journey, the time is computed in msc. Figure 5, 6, 7 and 8 present some
snapshots of these tasks.

Figure 5 MA Test visit trusted host no 1

Figure 6 MA Test visit untrusted host no 6

48
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013

Figure 7 MA Test visit trusted host no 4 after visiting
Untrusted host no 6

Figure 8 MA Test returns home

This process is repeated but one of the hosts is assigned to an untrusted host to see how PMM
deals with the untrusted host. Also, the time is computed in each turn. Figure 9 shows the result
of this experiment.

49
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013

760
740
720
700
680
660

Test No.1

640

Test No2

620
600
580
560
1

2

3

4

5

6

7

8

9

10

11

Figure 9 Two tests results in PM system

In figure 10 test No1 represents the cost of time in msc of the MA journey that has visited 50
trusted hosts. Test No2 represents the cost of time of the MA that has visited 50 hosts one of them
is an untrusted host. In test No2 PMM Mechanism has been used and we see, PMM has a little
effect in performance.
In next experiment, a MA has created to visit 50 hosts randomly 11 times. In each turn, the
number of untrusted hosts is increased by one. The experiment starts with 0 untrusted hosts to 10
untrusted hosts. A figure 6 presents the result.
2500
2000
1500
1000
500
0
1

2

3

4

5

6

7

8

9

10

11

Figure 10 presents PM using from 0 to 10 untrusted hosts.

50
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013

By using Regression linear model, the following equation has been developed to represents the
performance:

( )=

+

X represents the number of untrusted hosts. Based on the experiment, the model of the
performance is:

y(x) = 491.2 + 152.1x
The error has been computed and it is equal to 0.016 msc

5.CONCLUSION
In this paper a new mechanism has been proposed. The mechanism is called Partial-Mobility
Mechanism (PMM). The main idea of PMM is to protect the MAs against malicious hosts. PMM
has two types of MAs, the MHA which can visit only trust hosts and the OHA which can visit
only untrusted hosts. The trusted hosts help PMM to generate OHAs. PMM components have
been explained and implemented. Some experiments have been done to test the feasibility and the
performance in terms of time cost.

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]

Rothermel, Kurt, and Fritz Hohl, eds. Mobile Agents: Second International Workshop, MA'98,
Stuttgart, Germany, September 9-11, 1998. Vol. 147. Springer, 1998.
Karnik, Neeran, Security in Mobile Agent Systems, Ph.D. dissertation. Department of Computer
Science and Engineering, University of Minnesota, 1998
B.H. Tay, A. Ananda, A Survey of Remote Procedure Calls, Operating system Review, 24(3), PP 6379, July 1990.
R. S. Gary, Agent Tcl: A flexible an Secure Mobile Agent System, Fourth Annual Tcl/Tk Workshop
(TCL 96) ( Monterey, California, July 1996), M Diekhans and M Roseman, editors, July 1996.
Karjoth, Günter, Danny B. Lange, and Mitsuru Oshima. "A security model for aglets."Internet
Computing, IEEE 1.4 (1997): 68-77.
Giansiracusa, Michelangelo. "Mobile agent protection mechanisms, and the trusted agent proxy
server (taps) architecture." Information Security Institute (ISI). 2003.
Jansen, W., and T. Karygiannis. "NIST Special Publication 800-19-Mobile Agent Security, Technical
paper, National Institute of Standards and Technology." Computer Security Division.
J.M. Cueva Lovelle et al. (Eds.): ICWE 2003, LNCS 2722, pp. 289–292, Springer-Verlag Berlin
Heidelberg 2003
Leila Ismail, A Secure Mobile Agents Platform, JOURNAL OF COMMUNICATIONS, VOL. 3,
NO. 2, 2008
Mattern, Friedemann. "Mobile Agents." Informationstechnik und Technische Informatik 40 (1998):
12-17.
G. Vigna, Cryptography Traces for Mobile Agents, In G. Vigna , editor, Mobile Agent and Security,
volume 1419, 1998.
A. Suen, Mobile Agent Protection with Data Encapsulation and Execution Tracing, Master Thesis,
The Florid State University, 2003.
F. Hohl, Time Limited Blackbox Security: Protection Mobile Agent From Malicious Hosts, In G.
Vigna , editor, Mobile Agent and Security , PP 92-113 ,1998.

51
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013

[14] T. Sander , C. F. Tschudin , Protecting Mobile Agent Against Malicious Hosts,In G. Vigna , editor,
Mobile Agent and Security, Vol. 1419, 1998.
[15] Anand Tripathi, Neeran Karnik, A Security Architecture for Mobile Agents in Ajanta, Proceedings of
the International Conference on Distributed Computing Systems, April 2000.
[16] B. S. Yee, A Sanctuary for Mobile Agents, In Secure Internet Programming, PP 261-273, 1999.
[17] J. Riordan and B. Schneier, Environment Key Generation Toward Clueless Agents, Technical Report,
1998.
[18] Hock Kim Tan and L. Moreau, Mobile Code For Key Propagation, Paper, Notes in theoretical
Computer Science 63, UK, 2001.
[19] Tarig Ahmed , Increasing Mobile Agent Performance by Using Free Areas Mechanism, Journal of
Object Technology, 2007
[20] Shan, Liang, and Sabu Emmanuel. "Mobile agent protection with self-modifying code." Journal of
Signal Processing Systems 65.1 (2011): 105-116.
[21] Ahmed, Tarig Mohamed. "Using secure-image mechanism to protect mobile agent against malicious
hosts." World Academy of Science, Engineering & Technology 59 (2009): 439-444.

52

Mais conteúdo relacionado

Mais procurados

A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...
IJECEIAES
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
Sahithi Naraparaju
 
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
IJET - International Journal of Engineering and Techniques
 

Mais procurados (17)

A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
Security challenges in mobile ad hoc
Security challenges in mobile ad hocSecurity challenges in mobile ad hoc
Security challenges in mobile ad hoc
 
IDS - Analysis of SVM and decision trees
IDS - Analysis of SVM and decision treesIDS - Analysis of SVM and decision trees
IDS - Analysis of SVM and decision trees
 
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSINTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
 
Kb2417221726
Kb2417221726Kb2417221726
Kb2417221726
 
Ids 015 architecture and implementation of ids
Ids 015 architecture and implementation of idsIds 015 architecture and implementation of ids
Ids 015 architecture and implementation of ids
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analytics
 
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
 
USE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKS
USE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKSUSE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKS
USE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKS
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
 
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
 

Destaque

THE SYSTEM FOR ORGANIZATIONAL MANAGEMENT OF THE IMPLEMENTATION OF THE PROGRAM...
THE SYSTEM FOR ORGANIZATIONAL MANAGEMENT OF THE IMPLEMENTATION OF THE PROGRAM...THE SYSTEM FOR ORGANIZATIONAL MANAGEMENT OF THE IMPLEMENTATION OF THE PROGRAM...
THE SYSTEM FOR ORGANIZATIONAL MANAGEMENT OF THE IMPLEMENTATION OF THE PROGRAM...
Andrey Shabarov
 
A guideto handbagcare
A guideto handbagcareA guideto handbagcare
A guideto handbagcare
Adi Joy
 
rebbecca chambers cv for submittion
rebbecca chambers cv for submittionrebbecca chambers cv for submittion
rebbecca chambers cv for submittion
Rebbecca Chambers
 
خطة عمل في دورة انتل 2010
خطة عمل في دورة انتل 2010خطة عمل في دورة انتل 2010
خطة عمل في دورة انتل 2010
aasrawi
 

Destaque (18)

IRW Chapter 8
IRW Chapter 8IRW Chapter 8
IRW Chapter 8
 
THE SYSTEM FOR ORGANIZATIONAL MANAGEMENT OF THE IMPLEMENTATION OF THE PROGRAM...
THE SYSTEM FOR ORGANIZATIONAL MANAGEMENT OF THE IMPLEMENTATION OF THE PROGRAM...THE SYSTEM FOR ORGANIZATIONAL MANAGEMENT OF THE IMPLEMENTATION OF THE PROGRAM...
THE SYSTEM FOR ORGANIZATIONAL MANAGEMENT OF THE IMPLEMENTATION OF THE PROGRAM...
 
Reporte
ReporteReporte
Reporte
 
Armstrong comments 04 28-14-1
Armstrong comments 04 28-14-1Armstrong comments 04 28-14-1
Armstrong comments 04 28-14-1
 
Linea del tiempo
Linea del tiempoLinea del tiempo
Linea del tiempo
 
You Suck! Prevent & Address Negative Customer Feedback
You Suck! Prevent & Address Negative Customer FeedbackYou Suck! Prevent & Address Negative Customer Feedback
You Suck! Prevent & Address Negative Customer Feedback
 
Filosofía educativa: El existencialismo.
Filosofía educativa: El existencialismo. Filosofía educativa: El existencialismo.
Filosofía educativa: El existencialismo.
 
A guideto handbagcare
A guideto handbagcareA guideto handbagcare
A guideto handbagcare
 
Bijker, M. (2010) Making Measures And Inferences Reserve
Bijker, M. (2010)   Making Measures And Inferences ReserveBijker, M. (2010)   Making Measures And Inferences Reserve
Bijker, M. (2010) Making Measures And Inferences Reserve
 
Mountain Brook PPT Game for 1st Grade
Mountain Brook PPT Game for 1st GradeMountain Brook PPT Game for 1st Grade
Mountain Brook PPT Game for 1st Grade
 
Slideshare Linkedin
Slideshare LinkedinSlideshare Linkedin
Slideshare Linkedin
 
Ggggg
GggggGgggg
Ggggg
 
Sheyla's rice pudding
Sheyla's rice puddingSheyla's rice pudding
Sheyla's rice pudding
 
rebbecca chambers cv for submittion
rebbecca chambers cv for submittionrebbecca chambers cv for submittion
rebbecca chambers cv for submittion
 
Amanat drama lulu baru
Amanat drama lulu baruAmanat drama lulu baru
Amanat drama lulu baru
 
Free time
Free timeFree time
Free time
 
خطة عمل في دورة انتل 2010
خطة عمل في دورة انتل 2010خطة عمل في دورة انتل 2010
خطة عمل في دورة انتل 2010
 
Portfolio Giulia Patrizi
Portfolio Giulia PatriziPortfolio Giulia Patrizi
Portfolio Giulia Patrizi
 

Semelhante a Protect mobile agent against malicious host using partial mobility mechanism

A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
IJERA Editor
 

Semelhante a Protect mobile agent against malicious host using partial mobility mechanism (20)

A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents from
 
H1803055461
H1803055461H1803055461
H1803055461
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
Intrusion Detection System using Hidden Markov Model (HMM)
Intrusion Detection System using Hidden Markov Model (HMM)Intrusion Detection System using Hidden Markov Model (HMM)
Intrusion Detection System using Hidden Markov Model (HMM)
 
A Novel Exploit Traffic Traceback Method Based on Session Relationship
A Novel Exploit Traffic Traceback Method Based on Session RelationshipA Novel Exploit Traffic Traceback Method Based on Session Relationship
A Novel Exploit Traffic Traceback Method Based on Session Relationship
 
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTSECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
An anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingAn anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computing
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
Am03402220229
Am03402220229Am03402220229
Am03402220229
 
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYDIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
 
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYDIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
 
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYDIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
 
SecurityGen-whitepaper-gtp-firewall- security 5G.pdf
SecurityGen-whitepaper-gtp-firewall- security 5G.pdfSecurityGen-whitepaper-gtp-firewall- security 5G.pdf
SecurityGen-whitepaper-gtp-firewall- security 5G.pdf
 
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
 
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdfSecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
 

Mais de ijfcstjournal

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
ijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
ijfcstjournal
 

Mais de ijfcstjournal (20)

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Protect mobile agent against malicious host using partial mobility mechanism

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 PROTECT MOBILE AGENT AGAINST MALICIOUS HOST USING PARTIAL-MOBILITY MECHANISM Tarig Mohamed Ahmed Faculty of Mathematical Sciences, University of Khartoum, Sudan ABSTRACT A mobile agent is a promising area in distributed systems. It is a new technology for computers to communicate. Despite the multiple benefits of the mobile agent, but there are several obstacles to its spread. The mobile agent protection is one of these obstacles. In this paper a new mechanism has been proposed to protect mobile. The mechanism is called Partial-Mobility Mechanism (PMM). The main idea behind this mechanism is to allow to mobile agents to visit malicious hosts partially by using a One-HopAgent (OHA). OHA is a type of the mobile agent that contains only a task that will be executed in a malicious host. By avoiding the mobile agent to visit the malicious host, PMM completely protects the mobile agent’s secrecy and integrity. PMM has been implemented using .Net framework and C# technologies. Some experiments have been conducted to test the feasibility and performance of the mechanism. Full analysis of the results have been presented and discussed. KEY WORD Mobile Agent, Mobility, Security, Privacy 1. INTRODUCTION Mobile agents (MAs) are independent objects capable to achieve tasks in heterogeneous networks on behaved of users. Based on user’s requests, the MAs start their journey and move autonomously among hosts. The users need a very short time of connection to network in order to dispatch MAs and after that they can go offline. This a big win in terms of reducing the communication cost. The MAs is working based on a concept of remote programming and asynchronous communication mode. So, the problem of the network interruptions and the network latencies are avoided. Based on these features, MAs could be used in many applications of distributed systems, for example, networks maintenance, applications deployments, information retrieval ...etc. The MA’s body consists of three parts: first part is a code which represents the behavior or tasks of the MA that will be executed in the hosts. The second part represents the MA’s data space which is updated according the execution of the first part. The third part is the execution state that keeps a execution start point in each host. The key feature of MAs system is a mobility that allows MAs to move among network nodes. There are two types of the mobility: the first is called strong mobility which allows MAs to move with code the three parts. When the MA arrives to next station during the journey, it will start the execution using its execution state. The second type is a weak mobility which allows to MA to move with the code and the data only. In this type, DOI:10.5121/ijfcst.2013.3604 41
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 the tasks will be executed similarly in all nodes but the data may change. Communication methods in MA systems are available between MAs themselves, MAs and their users or between the MA and the hosts. The communication provides some kind of information exchange between different entities. As general the message passing concepts are used in the MA systems. A security is one of the major important issues that should be carefully planned when developing a MA model. The model must protect all parties in the system such as: MAs, Hosts, the mobility and communications. This area has taken a wide range of researchers’ attention. And it could be classified as one of the biggest challenges. The importance of the security comes from the nature of the MAs itself; that contains distributed entities any gape of security will affect overall the system. The MA needs a protection against other malicious MAs and hosts. The host needs a protection against malicious MAs. Also, the channels of the mobility and the communication should be secured. Gary [4] has defined these security areas in details. This paper deals with MAs protection against malicious hosts. The MA may face many risks form hosts such as stealing sensitive information like credit cards’ numbers, attacking the integrity of the MAs, preventing the MA to continue its journey...etc. All these possible attack have been resolved by PMM. This mechanism is completely protected the MA against malicious hosts. A full description of the mechanism will be presented later. As road map of the paper: section 2 presents some recent researches related to the MA protection. Section 3 provides full description of PMM. Section 4 presents some experiments related to PMM’s feasibility and performance with results discussion. Finally, section 5 concludes this paper and giving some recommendations as future works. 2.RELATED WORK Many risks surround The MAs system. It is important to find a way that could mitigate these risks. The following points represent some of them [5]: - Eavesdropping: Try to attack the secret or sensitive information in the MA. For example, information that is collected from others hosts or Credit Card Number. - Intercepting and altering: this type of attack affects the behavior of the MA by making some modification of the MAs’ tasks, the itinerary table or results that collected hosts for example. - Reply: illegally sending a MA’s copy to perform a malicious action. - Masquerade: An entity of MA’s system pretends to be a different entity. - Capturing: Hosts or service provides may capture the MAs and prevent them to continue their journeys. This area of security has taken grade attention from the researches and some valuable mechanisms have been proposed to protect the MAs against malicious hosts. [6, 7]: Self-Modifying Code Mechanism: This mechanism proposes an obfuscation algorithm based on self-modifying code to prevent attacks against a MA’s code at function level. The mechanism’s algorithm has been implements and it proves the efficacy [20]. Host Revocation Authority: The main idea of this mechanism is to use a Trusted Third Party, the Host Revocation Authority. The HoRA plays an important role by controlling malicious actions that are done by the hosts in the past. The MA’s sender must consult the HoRA before sending 42
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 the MAs to the hosts with bad history [8]. This mechanism fails to protect the MA against malicious hosts in case no history related to that hosts. A Secure Mobile Agents Platform: By using access control and authentication, this mechanism protects the MAs. The host controls all the resources available on it. Each MA defines its own control policy for other MAs by using an Interface Definition Language (IDL) [9]. Execution Tracing: Gary [10] proposes to detect the malicious actions from the MAs after returning home. Vigna [11] proposes a mechanism to detect the attack by using cryptographic traces and looking to the MAs history file (log) where the MA’s user will know if the MA has achieved its duties correctly or not [12]. In this mechanism the MA must maintain large log information and this is a drawback. Also, a secure protocol is required for transferring cryptography hashes for external entities. Obfuscated Code: The main idea behind this mechanism is to create a Black Box out of an original MA to execute the same task of the MA as an original MA, but by different arrangement [13]. Obfuscated Code has disadvantages, for example, no black-box algorithms exist that work for arbitrary data. Sander and Tschudin [14] used cryptography in their approach in special cases by having the MA’s program computes not the original, but an encrypted version of it. The result of this function is decrypted by the MA’s user. But, cryptography theory has not a schema that computes arbitrary function in a non-interactive manner. The Ajanta mechanism: This mechanism proposes three approaches for protecting the MA [15]. The first is to allow the programmer to define parts of the MA’s state as Read-Only and if any modification occurs to these parts, the MA’s user can detect using the digital signature mechanism. The second approach is let the MA creates append-only data states container where the data stored in this container can not be deleted or altered without detection by MA’s user. The third approach is to let programmers to define data states to specific hosts and no other hosts can deal with these data states. These mechanisms use the encryption, the decryption and the digital signature. Partial Result Encapsulation: This mechanism detects attacks by using encapsulating the results of MA actions at each host, for subsequent verification or when it returns to the home [16]. The disadvantage of this mechanism, for example, does nothing to ensure MA’s privacy. Also, the results to encapsulate may not be immediately clear. Environment Key Generation mechanism: When some environment condition is occurred, this mechanism allows the MA to take an action. A key is generated is used to unlock some executable code that was encrypted [17]. This approach has weakness such as: the control of the MA could simply modify. The host limits the capability to execute a MA’s code that not related dynamically, sense it is considered an unsafe operation. The mechanism is connected with other protection mechanism. KeyLets mechanism: This mechanism based on partitioning a MA as units according to the task type [18]. By using secret keys, it encrypts each unit to protect them. The distribution of keys to different hosts is done through the execution of specific type of a MA that is termed a Keylet. The disadvantages of this approach: Propagation requires a third party code producer that can supply the MA by a template the MA’s owner. Also, a large number of transactions related to the keylet 43
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 and a host may not be willing to support the increased of computation. Moreover, key revocation is not good in quality. In addition, it requires a complicated mechanism to categorize tasks of the MA. Also, this mechanism does not protect the MA code completely. 3.PARTIAL-MOBILITY MECHANISM Partial-Mobility Mechanism (PMM) is a new mechanism to protect MAs integrity and privacy against malicious hosts. In PMM the MA has two types: the first one is an One_Hop_Agent (OHA) which can visit only one host. The second is a Multi-Hop-Agent (MHA) which can visit multiple hosts. The MHA can contain multiple of OHAs. The main idea behind PMM is to allow to the One-Hop-Agent to visit untrusted hosts only. So, the MA will not visit any host that is classified as untrusted host. In PMM, all hosts will be visit by MAs are classified in two categories, trusted and untrusted hosts. Now, a full detail of PMM is described as follows: 3.1 MA in PMM In PMM the MA has two types: OHA which represents the task that will be executed in an untrusted host. OHA is valid to work in only one host. OHA consists of three main parts: part one, Data-Input which represents the inputs data that for the task that will be implemented in the untrusted host. Part two, Task which represents the task required from the untrusted host. Part three, Output-Info that represents the results after executing the task in the untrusted host. There is also other information related to system like mobility’s information. Figure 1 presents OHA. TASK Input-Data Input-Data Figure 1 One-Hop-Agent (OHA) The second type is MHA which can visit multiple hosts. The MHA consists of different items such as: an itinerary table, Tasks for each host, Data State (in PMM, strong mobility is used), Data and OHA’s table. The OHA’s table contains one task per each untrusted host. Figure 2 presents MHA. OHA1 OHA2 … OHAn Task1 Task2 … Taskm Figure 2 Multi-Hop Agent (MHA) 44
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 Also, MHA has additional information related to communication, security, execution state…etc. Based on user’s request, a MA is created. Suppose the MA will visit N hosts. If M (0<M <N) hosts are classified as untrusted hosts. In this case, the MA will contain N-M tasks which represent the tasks in trusted hosts in the MHA. For untrusted hosts, M tasks for OHAs will be created and embedded in the MHA. 3.2 Mobility in PMM In PMM the strong mobility is used. As mentioned above, in PMM there are two types of MAs, MHA which represents the tasks that will be executed in trusted hosts and OHA which represents a task that will be executed in an untrusted host. To represent one MA, PMM needs only one MHA and at least one OHA which embedded in MHA. The mobility in PMM has two ways. The first one is related MHA which the MA movies normally among hosts using the itinerary table. But, if the next station of the MA is an untrusted host, the second way of the mobility will be used. It is related to OHA. The MHA will not visit the untrusted host, instead of that; the specified OHA will visit the untrusted host. The security of PMM comes from this point that the MHA which contain the all tasks and others OHAs are not allowed to visit any host that classified as untrusted host. By this way, the MAs are completely protected against malicious hosts. Figure 3 presents mobility mechanism in PMM. 1 MHA OHA MHA 2 OHA OHA 3 Trusted Host1 Trusted OHA Untrusted Host2 Host3 4 MHA 3 Trusted Host4 Figure 3 the mobility mechanism in PMM 45
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 As seen in figure 3, the hosts are classified as trusted and untrusted hosts. If the trusted host is a next station in the itinerary table, the MAH will movie to that host. On the other hand, if the next host is untrusted the OHA will move to that host. By this approach, untrusted host will never deal with content of the MA. 3.2 PMM implementation Base on above PMM concepts, a full MA’s system has been developed using C# language and Dot Net Framework as application platform. The system consists from different entities such as following: a. MA’s Home MA’s home plays important role in the system. It creates the MA’s according to users’ requests. This entity identifies all hosts that will be visit by the MA. There is a C#’s class to represent the MAs. By using the class, the MA object is created. b. MA’s Server This entity aims to receive the MAs after finishing their journeys. It connects to MSAccess 2007 as a database to store all information that has been collected by the MAs. The server can receive many MAs simultaneously. After MAs arriving to this place, the server extracts and stores the information in the database. c. Hosts The hosts are classified into two classes: trusted and untrusted hosts. These hosts as general provide the MAs by services. The main different between two classes is in dealing with MAs. The trusted can receive and serve only MHAs and the other can receive and serve only OHAs. Also, the trusted hosts can generate OHAs based on the task required to implemented in case the next station is an untrusted host. Figure 4 presents the architecture of the PM system. 46
  • 7. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 1 OHA MHA MHA 2 OHA OHA 3 Trusted Trusted Host1 OHA Untrusted Host2 Host3 MHA 3 Trusted Host N MHA HOME Database Figure 4 PM architecture 4. EXPERIMENTS To test the feasibility and the performance of PM many experiments have been done using the PMM’s implementation as following: a) At first, a MA has been generated to visits 50 hosts all hosts are assigned to be trusted hosts. The hosts have been selected randomly to create the itinerary table. This process is 47
  • 8. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 repeated 10 times and in each turn, the itinerary table is created randomly. After MA completes the journey, the time is computed in msc. Figure 5, 6, 7 and 8 present some snapshots of these tasks. Figure 5 MA Test visit trusted host no 1 Figure 6 MA Test visit untrusted host no 6 48
  • 9. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 Figure 7 MA Test visit trusted host no 4 after visiting Untrusted host no 6 Figure 8 MA Test returns home This process is repeated but one of the hosts is assigned to an untrusted host to see how PMM deals with the untrusted host. Also, the time is computed in each turn. Figure 9 shows the result of this experiment. 49
  • 10. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 760 740 720 700 680 660 Test No.1 640 Test No2 620 600 580 560 1 2 3 4 5 6 7 8 9 10 11 Figure 9 Two tests results in PM system In figure 10 test No1 represents the cost of time in msc of the MA journey that has visited 50 trusted hosts. Test No2 represents the cost of time of the MA that has visited 50 hosts one of them is an untrusted host. In test No2 PMM Mechanism has been used and we see, PMM has a little effect in performance. In next experiment, a MA has created to visit 50 hosts randomly 11 times. In each turn, the number of untrusted hosts is increased by one. The experiment starts with 0 untrusted hosts to 10 untrusted hosts. A figure 6 presents the result. 2500 2000 1500 1000 500 0 1 2 3 4 5 6 7 8 9 10 11 Figure 10 presents PM using from 0 to 10 untrusted hosts. 50
  • 11. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 By using Regression linear model, the following equation has been developed to represents the performance: ( )= + X represents the number of untrusted hosts. Based on the experiment, the model of the performance is: y(x) = 491.2 + 152.1x The error has been computed and it is equal to 0.016 msc 5.CONCLUSION In this paper a new mechanism has been proposed. The mechanism is called Partial-Mobility Mechanism (PMM). The main idea of PMM is to protect the MAs against malicious hosts. PMM has two types of MAs, the MHA which can visit only trust hosts and the OHA which can visit only untrusted hosts. The trusted hosts help PMM to generate OHAs. PMM components have been explained and implemented. Some experiments have been done to test the feasibility and the performance in terms of time cost. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] Rothermel, Kurt, and Fritz Hohl, eds. Mobile Agents: Second International Workshop, MA'98, Stuttgart, Germany, September 9-11, 1998. Vol. 147. Springer, 1998. Karnik, Neeran, Security in Mobile Agent Systems, Ph.D. dissertation. Department of Computer Science and Engineering, University of Minnesota, 1998 B.H. Tay, A. Ananda, A Survey of Remote Procedure Calls, Operating system Review, 24(3), PP 6379, July 1990. R. S. Gary, Agent Tcl: A flexible an Secure Mobile Agent System, Fourth Annual Tcl/Tk Workshop (TCL 96) ( Monterey, California, July 1996), M Diekhans and M Roseman, editors, July 1996. Karjoth, Günter, Danny B. Lange, and Mitsuru Oshima. "A security model for aglets."Internet Computing, IEEE 1.4 (1997): 68-77. Giansiracusa, Michelangelo. "Mobile agent protection mechanisms, and the trusted agent proxy server (taps) architecture." Information Security Institute (ISI). 2003. Jansen, W., and T. Karygiannis. "NIST Special Publication 800-19-Mobile Agent Security, Technical paper, National Institute of Standards and Technology." Computer Security Division. J.M. Cueva Lovelle et al. (Eds.): ICWE 2003, LNCS 2722, pp. 289–292, Springer-Verlag Berlin Heidelberg 2003 Leila Ismail, A Secure Mobile Agents Platform, JOURNAL OF COMMUNICATIONS, VOL. 3, NO. 2, 2008 Mattern, Friedemann. "Mobile Agents." Informationstechnik und Technische Informatik 40 (1998): 12-17. G. Vigna, Cryptography Traces for Mobile Agents, In G. Vigna , editor, Mobile Agent and Security, volume 1419, 1998. A. Suen, Mobile Agent Protection with Data Encapsulation and Execution Tracing, Master Thesis, The Florid State University, 2003. F. Hohl, Time Limited Blackbox Security: Protection Mobile Agent From Malicious Hosts, In G. Vigna , editor, Mobile Agent and Security , PP 92-113 ,1998. 51
  • 12. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 [14] T. Sander , C. F. Tschudin , Protecting Mobile Agent Against Malicious Hosts,In G. Vigna , editor, Mobile Agent and Security, Vol. 1419, 1998. [15] Anand Tripathi, Neeran Karnik, A Security Architecture for Mobile Agents in Ajanta, Proceedings of the International Conference on Distributed Computing Systems, April 2000. [16] B. S. Yee, A Sanctuary for Mobile Agents, In Secure Internet Programming, PP 261-273, 1999. [17] J. Riordan and B. Schneier, Environment Key Generation Toward Clueless Agents, Technical Report, 1998. [18] Hock Kim Tan and L. Moreau, Mobile Code For Key Propagation, Paper, Notes in theoretical Computer Science 63, UK, 2001. [19] Tarig Ahmed , Increasing Mobile Agent Performance by Using Free Areas Mechanism, Journal of Object Technology, 2007 [20] Shan, Liang, and Sabu Emmanuel. "Mobile agent protection with self-modifying code." Journal of Signal Processing Systems 65.1 (2011): 105-116. [21] Ahmed, Tarig Mohamed. "Using secure-image mechanism to protect mobile agent against malicious hosts." World Academy of Science, Engineering & Technology 59 (2009): 439-444. 52