Detecting Intrusions in Mobile Agents

msra(2005)

引用 23|浏览5
暂无评分
摘要
This research identifies and analyzes ways that ensure the secure operation of a multi-agent system (MAS) on an untrusted host. Because of the propensity of the malicious host to spy and leak usage patterns, block useful work and feed false or misleading information, it becomes necessary for the software agent to detect intrusions and protect its security. While enabling secure transactions on a malicious host is considered one of the most challenging problems in mobile agent security, ideas such as mess-up code, time-limited black-box security, and alternating usage of secure hardware can be found in literature. The goal of this project is to design a simple protocol that utilizes a combination of the aforementioned ideas in conjunction with some novel ideas in code/data separation, trust-establishment and a probabilistic method to mask legitimate data transmission and interaction patterns to demonstrate certain levels of security can be achieved in a malicious environment.
更多
查看译文
关键词
security,intrusion de- tection.,index terms— multi-agent systems,multi agent system,it security,data transmission,indexing terms,probabilistic method,mobile agent,software agent
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要