Title :
A mobile agent-based P2P model for autonomous security hole discovery
Author :
Wang, Xin ; Zheng, Ji ; Xiao, Kun ; Xue, Xiangyang ; Toh, C.K.
Author_Institution :
Dept. of Comput. Sci. & Eng., Fudan Univ., Shanghai, China
Abstract :
Generally an agent-based security system is constructed hierarchical, with a central manager acting as head of the whole system. However, the manager becomes a bottleneck for being connected by each client. It can even overload when too many clients request service simultaneously. The whole system may collapse when the central manager is attacked. And these systems are passive to detect and deal with the secure problem. We present a mobile agent-based P2P model for autonomous security hole discovery (MASHD). It can detect infection and network intrusion based on knowledge of the local host. Viruses are removed and connections are refused after identification. In case of a suspicious activity, MASHD initiates a voting approach to make a collective decision and take further action. The integration of peer-to-peer behavior with mobile agents reduces latency and load; however, flexibility, effectivity, security and cooperation of the system are enhanced.
Keywords :
authorisation; computer viruses; mobile agents; peer-to-peer computing; autonomous security hole discovery; computer viruses; mobile agent; network intrusion; peer-to-peer computing; security system; Computer science; Computer security; Computer viruses; Engineering management; Information security; Intrusion detection; Mobile agents; Peer to peer computing; Protection; Voting;
Conference_Titel :
Computer and Information Technology, 2005. CIT 2005. The Fifth International Conference on
Print_ISBN :
0-7695-2432-X
DOI :
10.1109/CIT.2005.18