期刊文献+

基于拆分-协作方法的移动Agent安全保护

PROTECTING MOBILE AGENT AGAINST MALICIOUS HOST ATTACKS USING SPLITTING AND COOPERATION
在线阅读 下载PDF
导出
摘要 恶意主机对移动Agent的威胁是移动Agent技术应用的主要障碍之一。对此,提出一种基于拆分-协作的保护移动Agent的方法。根据功能模块将一个移动Agent拆分成多个子Agent协同工作,完成原移动Agent相同的功能。借助信息论中的熵理论,证明了这种拆分使得移动Agent任务的理解难度随拆分数目的增长成正比增长,有助于保护移动Agent的机密性,从而在一定程度上阻止了恶意主机对移动Agent的攻击。最后讨论了效率问题及拆分的副作用。 In mobile agent application systems, security of mobile agents themselves is critical. According to the problems that malicious host may attack the mobile agents,we propose a method to protect mobile agents l^y splitting each one into a group of cooperative sub-agents which have the same function. Using Shannon's Entropy theory, we prove that the more fractions we split the agent into, the less likely one is able to understand it. This is helpful to protect the confidentiality and consequently prolong the attack time in some degree. The efficiency and side effect of the splitting are analyzed and the design and implementation issues of out prototype system are discussed.
出处 《计算机应用与软件》 CSCD 北大核心 2007年第1期165-168,共4页 Computer Applications and Software
关键词 移动AGENT 拆分 协作 恶意主机 安全 Mobile agent SPlit Cooperate Malicious host Security
  • 相关文献

参考文献15

  • 1Larry D'Anna,Brian Matt,Andrew Reisse,Tom Van Vleck,Steve Schwab,Patrick LeBlanc,Self-Protecting Mobile Agents Obfuscation Report,Network Associates Laboratories 2003.6.30.
  • 2L.Gong,M.Mueller,H.Prafullchandra,and R.Schemers.Going Beyond the Sandbox:An Overview of the New Security Architecture in the Java Development Kit 1.2,in USENIX Symposium on Internet Technologies and Systems,Monterey,California,December 1997.
  • 3R.Wahbe,S.Lucco,T.Anderson,and S.Graham,Efficient Software based Fault Isolation.in Proceedings ACM Symp.on Operating System Principles,December 1993,pp.203~216.
  • 4E.Rescorla,SSL and TLS:Designing and Building Secure Systems,Addison Wesley,2001.
  • 5A.Main 1 P.C.van Oorschot Software Protection and Application Security:Understanding the Battelground.
  • 6Fritz Hohl,A Model of Attacks of Malicious Hosts against Mobile Agents,In Fourth Workshop on Mobile Object Systems(MOS'98):Secure Internet Mobile Computations.
  • 7Panos E.Livadas,Scott D.Alden,A Toolset for Program Understanding.Program Comprehension,1993.Proceedings,IEEE Second Workshop on,1993,pp.110~118.
  • 8Harman,M.S.Danicic & Y.Sivagurunathan,Program Comprehension Assisted by Slicing and Transformation.First UK Program Comprehension Workshop,Centre for Software Maintenance,University of Durham,Malcolm Munro(ed.),6th~7th of July,1995.
  • 9Bogdan Korel,Jurgen Rilling,Program Slicing in Understanding of Large Programs,Program Comprehension,1998.IWPC'98.Proceedings.,6th International Workshop on,1998,pp.145~152.
  • 10Sau-Koon Ng,Protecting Mobile Agents Against Malicious Hosts,The Chinese University of Hong Kong June 2000.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部