Loading…

A protocol for detecting malicious hosts based on limiting the execution time of mobile agents

Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered...

Full description

Saved in:
Bibliographic Details
Main Authors: Esparza, O., Soriano, M., Munoz, J.L., Forne, J.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. In O. Esparza et al. [2003] the authors introduced the idea of limiting the execution time in the hosts. Malicious hosts need time to analyze and modify an agent in order to take some profit. Controlling the execution time in the hosts permits detecting manipulation attacks performed by malicious hosts during the agents' execution. This paper presents a protocol for detecting malicious hosts based on the idea of execution time limiting.
ISSN:1530-1346
2642-7389
DOI:10.1109/ISCC.2003.1214130