• DocumentCode
    3348231
  • Title

    Identifying the split personality of the malicious host in the mobile agent environment

  • Author

    Venkatesan, S. ; Chellappan, C.

  • Author_Institution
    Dept. of CSE, Anna Univ., Chennai
  • Volume
    2
  • fYear
    2008
  • fDate
    6-8 Sept. 2008
  • Abstract
    Mobile agents are software programs capable of working autonomously and automatically. Mobile agents in the network will be the problem for the remote host if it is a malicious agent and also problem to the agent while it visits the malicious host. In this paper, we propose a model for identifying the split personality of the malicious hosts (machine attacks the agent) using the hash function comparison. Identifying the attack is better than the protection because it will identify the attacker is to remove from the environment.
  • Keywords
    cryptography; mobile agents; hash function; malicious host; mobile agent environment; split personality; Costs; Cryptography; Delay; Electronic mail; Intelligent agent; Intelligent networks; Intelligent systems; Mobile agents; Protection; Software algorithms; Cryptography; Hash function; Malicious attacks; Mobile agent; Split Personality;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligent Systems, 2008. IS '08. 4th International IEEE Conference
  • Conference_Location
    Varna
  • Print_ISBN
    978-1-4244-1739-1
  • Electronic_ISBN
    978-1-4244-1740-7
  • Type

    conf

  • DOI
    10.1109/IS.2008.4670529
  • Filename
    4670529