DocumentCode :
3348231
Title :
Identifying the split personality of the malicious host in the mobile agent environment
Author :
Venkatesan, S. ; Chellappan, C.
Author_Institution :
Dept. of CSE, Anna Univ., Chennai
Volume :
2
fYear :
2008
fDate :
6-8 Sept. 2008
Abstract :
Mobile agents are software programs capable of working autonomously and automatically. Mobile agents in the network will be the problem for the remote host if it is a malicious agent and also problem to the agent while it visits the malicious host. In this paper, we propose a model for identifying the split personality of the malicious hosts (machine attacks the agent) using the hash function comparison. Identifying the attack is better than the protection because it will identify the attacker is to remove from the environment.
Keywords :
cryptography; mobile agents; hash function; malicious host; mobile agent environment; split personality; Costs; Cryptography; Delay; Electronic mail; Intelligent agent; Intelligent networks; Intelligent systems; Mobile agents; Protection; Software algorithms; Cryptography; Hash function; Malicious attacks; Mobile agent; Split Personality;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Systems, 2008. IS '08. 4th International IEEE Conference
Conference_Location :
Varna
Print_ISBN :
978-1-4244-1739-1
Electronic_ISBN :
978-1-4244-1740-7
Type :
conf
DOI :
10.1109/IS.2008.4670529
Filename :
4670529
Link To Document :
بازگشت