A protocol for detecting malicious hosts based on limiting the execution time of mobile agents

Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Esparza, O., Soriano, M., Munoz, J.L., Forne, J.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. In O. Esparza et al. [2003] the authors introduced the idea of limiting the execution time in the hosts. Malicious hosts need time to analyze and modify an agent in order to take some profit. Controlling the execution time in the hosts permits detecting manipulation attacks performed by malicious hosts during the agents' execution. This paper presents a protocol for detecting malicious hosts based on the idea of execution time limiting.
ISSN:1530-1346
2642-7389
DOI:10.1109/ISCC.2003.1214130