Title :
Identifying the split personality of the malicious host in the mobile agent environment
Author :
Venkatesan, S. ; Chellappan, C.
Author_Institution :
Dept. of CSE, Anna Univ., Chennai
Abstract :
Mobile agents are software programs capable of working autonomously and automatically. Mobile agents in the network will be the problem for the remote host if it is a malicious agent and also problem to the agent while it visits the malicious host. In this paper, we propose a model for identifying the split personality of the malicious hosts (machine attacks the agent) using the hash function comparison. Identifying the attack is better than the protection because it will identify the attacker is to remove from the environment.
Keywords :
cryptography; mobile agents; hash function; malicious host; mobile agent environment; split personality; Costs; Cryptography; Delay; Electronic mail; Intelligent agent; Intelligent networks; Intelligent systems; Mobile agents; Protection; Software algorithms; Cryptography; Hash function; Malicious attacks; Mobile agent; Split Personality;
Conference_Titel :
Intelligent Systems, 2008. IS '08. 4th International IEEE Conference
Conference_Location :
Varna
Print_ISBN :
978-1-4244-1739-1
Electronic_ISBN :
978-1-4244-1740-7
DOI :
10.1109/IS.2008.4670529