DocumentCode
3348231
Title
Identifying the split personality of the malicious host in the mobile agent environment
Author
Venkatesan, S. ; Chellappan, C.
Author_Institution
Dept. of CSE, Anna Univ., Chennai
Volume
2
fYear
2008
fDate
6-8 Sept. 2008
Abstract
Mobile agents are software programs capable of working autonomously and automatically. Mobile agents in the network will be the problem for the remote host if it is a malicious agent and also problem to the agent while it visits the malicious host. In this paper, we propose a model for identifying the split personality of the malicious hosts (machine attacks the agent) using the hash function comparison. Identifying the attack is better than the protection because it will identify the attacker is to remove from the environment.
Keywords
cryptography; mobile agents; hash function; malicious host; mobile agent environment; split personality; Costs; Cryptography; Delay; Electronic mail; Intelligent agent; Intelligent networks; Intelligent systems; Mobile agents; Protection; Software algorithms; Cryptography; Hash function; Malicious attacks; Mobile agent; Split Personality;
fLanguage
English
Publisher
ieee
Conference_Titel
Intelligent Systems, 2008. IS '08. 4th International IEEE Conference
Conference_Location
Varna
Print_ISBN
978-1-4244-1739-1
Electronic_ISBN
978-1-4244-1740-7
Type
conf
DOI
10.1109/IS.2008.4670529
Filename
4670529
Link To Document