Abstract
In this paper we describe a security system against malicious agents in a wireless ad hoc network. This system monitors the activities of mobile agents. By mining the log data, the system builds dynamic behavioral profiles for each class of agents. The profiles are then used to classify each agent instance and detect anomalous agents. The malicious nature of identified anomalous agents are further determined by a threat assessment module. For mobile agent profiling, we presented two approaches: one based on rule-learning and another on histograms of features related each agent class. We have implemented a prototype system using the histogram-based approach. The prototype is also described in the paper.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Cohen, W.: Learning trees and rules with set-valued features. In: Proc. 13th AAAI (1996)
Gray, R.S., Kotz, D., Peterson, R.A., Barton, J., Chacon, D., Gerken, P., Hofmann, M., Bradshaw, J., Breedy, M.R., Jeffers, R., Suri, N.: Mobile-Agent versus Client/Server Performance: Scalability in an Information-Retrieval Task. In: Picco, G.P. (ed.) MA 2001. LNCS, vol. 2240, Springer, Heidelberg (2001)
Forrest, S., Hofmeyr, S.A., Somayaji, A., Logstaff, T.A.: A Sense of Self for Unix process. In: Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, pp. 120–128 (1996)
Jansen, W.: Countermeasures for mobile agent security. Computer Communications, Special Issue on Advances in Research and Application of Network Security (November 2000)
Lee, W., Stolfo, S.J., Chan, P.K.: Learning Patterns from Unix Process Execution Traces for Intrusion Detection. In: Proceedings of AAAI 1997 Workshop on AI Methods in Fraud and Risk Management, pp. 50–56 (1997)
Li, T.-Y., Lam, K.-Y.: Detecting Anomalous Agents in Mobile Agent System: A Preliminary Approach. In: AAMAS 2000 and AAMAS 2002, Bologna, Italy (2002)
Sultanik, E., Artz, D., Anderson, G., Kam, M., Regli, W., Peysakhov, M., Sevy, J., Belov, N., Morizio, N., Mroczkowski, A.: Secure Mobile Agents on Ad Hoc Wireless Networks. In: The 15th Innovative Applications of Artificial Intelligence Conference (IAAI), August 11-13 (2003)
Tan, H.K., Moreau, L.: Certificates for mobile code security. In: Proceedings of the, ACM Symposium on Applied Computing SAC 2002, pp. 76–81. ACM Press, New York (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, H., Greene, G., Alonso, R. (2006). Profile-Based Security Against Malicious Mobile Agents. In: Li, X., Zaïane, O.R., Li, Z. (eds) Advanced Data Mining and Applications. ADMA 2006. Lecture Notes in Computer Science(), vol 4093. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11811305_111
Download citation
DOI: https://doi.org/10.1007/11811305_111
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37025-3
Online ISBN: 978-3-540-37026-0
eBook Packages: Computer ScienceComputer Science (R0)