Skip to main content

Detection of Malicious Host Attacks by Tracing with Randomly Selected Hosts

  • Conference paper
Embedded and Ubiquitous Computing (EUC 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3207))

Included in the following conference series:

Abstract

The security aspect is crucial to the deployment of the mobile agent technology to commercial applications. The main issue is how to prevent the malicious modifications of code and data in the mobile agents, as the mobile agents may travel to different hosts to carry out tasks in an open environment. In this paper, we present a detection mechanism using tracing which provides more efficiency and higher privacy. Moreover, the performance of the protocol is analyzed in this paper. Some optimizations are also suggested to improve the performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zachary, J.: Protecting Mobile Code in the Wild. Internet Computing 7(2), 78–82 (2003)

    Article  MathSciNet  Google Scholar 

  2. Vigna, G.: Protecting Mobile Agents through Tracing. In: Proceedings of the 3rd ECOOP Workshop on Mobile Object Systems, Jyvalskyla, Finland (1997)

    Google Scholar 

  3. Hohl, F.: A Protocol to Detect Malicious Hosts Attacks by Using Reference States. Technical Report Nr. 09/99, Faculty of Informatics, University of Stuttgart, Germany (1999)

    Google Scholar 

  4. Yu, C.M., Ng, K.W.: A Flexible Tamper-Detection Protocol for Mobile Agents on Open Networks. In: Proceedings of the 2002 International Conference of Information and Knowledge Engineering, USA, pp. 248–254 (2002)

    Google Scholar 

  5. Rhazi, A.E., Pierre, S., Boucheneb, H.: Secure Protocol in Mobile Agent Environment. In: IEEE CCECE (2003)

    Google Scholar 

  6. Sander, T., Tschudin, C.: Protecting Mobile Agents against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  7. Funfrocken, S.: Protecting Mobile Web-Commerce Agents with Smartcards. In: Agent Systems and Applications (1999) and Third International Symposium on Mobile Agents. Proceedings, pp. 90–102 (1999)

    Google Scholar 

  8. Marques, P.J., Silva, L.M., Silva, J.G.: Establishing a Secure Open-Environment for Using Mobile Agents in Electronic Commerce. In: Agent Systems and Applications (1999) and Third International Symposium on Mobile Agents. Proceedings, pp. 268–269 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Leung, KK., Ng, KW. (2004). Detection of Malicious Host Attacks by Tracing with Randomly Selected Hosts. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds) Embedded and Ubiquitous Computing. EUC 2004. Lecture Notes in Computer Science, vol 3207. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30121-9_80

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30121-9_80

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22906-3

  • Online ISBN: 978-3-540-30121-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics