Title :
A protocol for detecting malicious hosts based on limiting the execution time of mobile agents
Author :
Esparza, Oscar ; Soriano, Miguel ; Muñoz, Jose L. ; Forné, Jordi
Author_Institution :
Tech. Uni. of Catalonia, Spain
Abstract :
Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. In O. Esparza et al. [2003] the authors introduced the idea of limiting the execution time in the hosts. Malicious hosts need time to analyze and modify an agent in order to take some profit. Controlling the execution time in the hosts permits detecting manipulation attacks performed by malicious hosts during the agents´ execution. This paper presents a protocol for detecting malicious hosts based on the idea of execution time limiting.
Keywords :
mobile agents; protocols; telecommunication security; code mobility; execution time limiting; malicious hosts detection; manipulation attacks detection; mobile agent systems; protocol; security problem; Authentication; Bandwidth; Cryptography; Data mining; Data security; Electronic commerce; Message passing; Mobile agents; Protection; Protocols;
Conference_Titel :
Computers and Communication, 2003. (ISCC 2003). Proceedings. Eighth IEEE International Symposium on
Print_ISBN :
0-7695-1961-X
DOI :
10.1109/ISCC.2003.1214130