DocumentCode :
3399636
Title :
A proposed paradigm for tracing the effect of security threats in various mobile agent systems
Author :
Nasr, Mona M.
Author_Institution :
Fac. of Comput. & Inf., Helwan Univ., Cairo, Egypt
fYear :
2015
fDate :
17-19 Feb. 2015
Firstpage :
1
Lastpage :
8
Abstract :
Many people consider that security is one of the complexes problems for practical use of mobile agents that move around the networks and do their tasks. This complexity is due mainly to the size of the problem, moreover, in open networks, security problems and costs of potential solutions might outweigh the benefits of mobility. The question of security goes both directions. How can data base servers be protected from malicious actions of mobile agents, and conversely, how can mobile agent, packed with private data and information, be protected from servers, and other agents while traveling through cyberspace. This paper presents a survey for the malicious (host /agent) facing Mobile Agent(MA). Platform to Agent P2A (Masquerading, Denial of Service, Eavesdropping, Alteration) Agent to Agent A2A (Masquerading, Denial of Service, Repudiation, Unauthorized Access). This paper, describes MA-based paradigm as a simulation based model for tracing the effect of one of the security threats that has been entirely developed in java programming language. The proposed paradigm considers a range of techniques that provide high degree of security during the mobile agent system life cycle in its simulation environment. This paper highlights the spot to two main design objectives: The importance of including various supportive types of agents within a system e.g., police agents, service agents,...etc. Second: Evaluation analysis and number of checks to be done to trace the MA if masqueraded during its path. eg. evaluation analysis for detecting tolerance differences for the calculated agent´s route before and during its journey, storing agent transactions, storing snapshots of agent state information, checking from time to time agent status and task completeness and lastly guard agent check the changed variables of migrated agent. During tracing and monitoring MA(s), the initiator node may destroy it and continue with another. In this paper we propose a new paradigm that detects - nd eliminate with high probability, any degree of tampering within a reasonable amount of time, also provide the ability of scalability of security administration.
Keywords :
Java; mobile agents; security of data; Java programming language; mobile agent system life cycle; security threats; tampering; Cryptography; Delays; Java; Mobile agents; Monitoring; Java Security; Mobile Agent; Policy; Security; Strong Mobility;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology: Towards New Smart World (NSITNSW), 2015 5th National Symposium on
Conference_Location :
Riyadh
Print_ISBN :
978-1-4799-7625-6
Type :
conf
DOI :
10.1109/NSITNSW.2015.7176428
Filename :
7176428
Link To Document :
بازگشت