共查询到19条相似文献,搜索用时 140 毫秒
1.
2.
针对移动代理在异质网络环境中的安全问题,提出了一种代码迷乱转换保护策略.代码迷乱技术应用于移动代理,是对执行任务的移动代理的保护和隐藏模式的探索.该方案首先提出基于交叉循环迷乱和改变数据关联的移动代理保护策略,接着阐述了交叉循环迷乱、多模块交叉循环迷乱以及改变数据之间内在关联的具体方法.实验证明,该方案成功抵御了给定的7个 java 解码程序,显示出比多层退出迷乱和单层退出迷乱方法的有效性. 相似文献
3.
4.
日益复杂和分布的入侵使得传统的人侵检测系统无法满足用户的需求,迫切需要采用新的方法来提高入侵检测系统的效率。针对本单位局域网特点,本文主要提出了一种基于移动代理技术的分布式入侵检测系统设计方案,该方案使用了协议分析和模式匹配相结合的方法,有效地缩小了目标的匹配范围,提高了检测速度;在决策过程中引入了关联分析模块和情报代理模块,能够更好的发现多个攻击之间的内在联系。经测试表明,该方案可以有效地降低误报率,较好地应对分布式拒绝服务攻击。 相似文献
5.
1、引言 如何有效利用网络计算资源?如何提高网络通信性能、信息获取能力和系统响应速度,如何提高系统容错能力和系统可扩充性和适应性?许多在小规模网络内适用的模型、算法随着网络规模的扩大,其性能已越来越不能满足新需求了。所有这些都给传统分布式系统所常用的Client/Server模式提出了新的挑战。 移动代理作为一种新的分布式计算技术为上述问题的解决提供了新的途径,从本质上说,移动代理是一个功能相时独立,可以动态改变与其执行环境联接的代码片断。它是自冶的、异步的、具有智能化的软件实体,可以动态植入(漫… 相似文献
6.
基于PKI的移动代理安全策略研究 总被引:1,自引:0,他引:1
移动代理是新型的分布式计算技术,具有移动性和自治性两个特点,与传统的分布式计算模型Client/Server相比具有非常多的优势,有着广阔的应用前景,但安全问题一直困扰着移动代理的应用。针对移动代理系统所受的安全威胁以及带来的安全需求,提出了一种用PKI来实现移动代理系统安全性的方法,并分析了该方法的优点和有待改进的地方。 相似文献
7.
移动代理是一种新兴的网络技术,它提供了一个新的计算方式,在网络分布式环境中有着极为重要的作用。随着移动软件混合性的增加,也伴随着对安全的威胁。保护移动代理的代码及数据免受窜扰已成为移动代理能正常运行的关键。传统的密码机制不能直接应用到移动代理环境,考虑到移动代理的动态性和智能性等特点,提出了一种基于异步执行机制的新型移动代理方案,以增强移动代理和其执行环境的安全可靠性、最后对其做了安全分析和性能分析。 相似文献
9.
10.
11.
To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobile 2D code as the interface and dynamic password as the core.First,the actuator pool of the authentication server was constructed.Then,a central controller consisting of functional modules such as input distribution agent,selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally,a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method,and at the same time,it can be used in combination with other authentication methods. 相似文献
12.
Oscar Esparza Jose L. Muoz Joan Toms‐Buliart Miguel Soriano 《Wireless Communications and Mobile Computing》2011,11(11):1446-1462
Mobile agents are software entities consisting of code, data, and state that can migrate autonomously from host to host executing their code. In such scenario there are some security issues that must be considered. In particular, this paper deals with the protection of mobile agents against manipulation attacks performed by the host, which is one of the main security issues to solve in mobile agent systems. This paper introduces an infrastructure for mobile agent watermarking (MAW). MAW is a lightweight approach that can efficiently detect manipulation attacks performed by potentially malicious hosts that might seek to subvert the normal agent operation. MAW is the first proposal in the literature that adapts software watermarks to verify the execution integrity of an agent. The second contribution of this paper is a technique to punish a malicious host that performed a manipulation attack by using a trusted third party (TTP) called host revocation authority (HoRA). A proof‐of‐concept has also been developed and we present some performance evaluation results that demonstrate the usability of the proposed mechanisms. Copyright © 2010 John Wiley & Sons, Ltd. 相似文献
13.
Mobile agent security 总被引:2,自引:0,他引:2
The agent paradigm is currently attracting much research. A mobile agent is a particular type of agent with the ability to migrate from one host to another, where it can resume its execution. We consider security issues that need to be addressed before multi-agent systems in general, and mobile agents in particular, can be a viable solution for a broad range of commercial applications. This is done by considering the implications of the characteristics given to agents and the general properties of open multi-agent systems. The paper then looks in some more detail at security technology and methods applicable to mobile agent systems. 相似文献
14.
Building reusable mobile agents for network management 总被引:7,自引:0,他引:7
I. Satoh 《IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews》2003,33(3):350-357
Mobile agents can migrate among nodes to perform a set of management tasks at each of the visited nodes. Existing mobile agent-based network management systems often assume that their mobile agents are designed to work in particular networks to raise the efficiency of agent migration among multiple nodes. Unfortunately, such mobile agents cannot be reused in different networks. This paper proposes a framework where a mobile agent for network management is composed of two kinds of software components, an itinerary part and a behavioral logic part. Both components are implemented as mobile agents. The former is a carrier designed for particular networks, and it can efficiently navigate other mobile agents among nodes in its target network. The latter defines management tasks performed at each node independently of any local network. This framework allows a mobile agent for network management to be reused in various networks without being modified. A prototype implementation of this framework and its application were built on a Java-based mobile agent system. 相似文献
15.
The practicality of mobile agents hinges on realistic security techniques. Mobile agent systems are combination client/servers that transport, and provide an interface with host computers for, mobile agents. Transport of mobile agents takes place between mobile agent systems, which are located on heterogeneous platforms, making up an infrastructure that has the potential to scale to the size of any underlying network. Mobile agents can be rapidly deployed, and can respond to each other and their environment. These abilities expose flaws in current security technology. This article surveys the risks connected with the use of mobile agents, and security techniques available to protect mobile agents and their hosts. The inadequacies of the security techniques developed from the information fortress model are identified. They are the result of using a good model in an inappropriate context (i.e. a closed system model in a globally distributed networking computing base). Problems with commercially available techniques include: (1) conflicts between security techniques protecting hosts and mobile agents, (2) inability to handle multiple collaborative mobile agents, and (3) emphasis on the credentials of software instead of on the integrity of software to determine the level of trust. 相似文献
16.
Agents need resources and protection from hostile influences, in both natural and artificial environments. This paper specifically considers social insects and software mobile agent systems, in order to understand how the need for mobility, resource acquisition and security can influence the design and operation of agent systems. Evolution has honed the movement, resource-gathering and defensive skills of the social insects in a multitude of ways. The paper reviews some of these strategies and assesses whether they may provide useful insights into the design and implementation of mobile software agents. This process is necessary as current mobile agent systems have been handicapped by a lack of convincing security measures which has prevented their adoption in mainstream computing services.This paper therefore examines the strategies for movement, resource acquisition and defence adopted by the social insects and considers how they may be applied to enhance the design of mobile agents. 相似文献
17.
Code mobility can be defined as the capability to dynamically change the bindings between code fragments and the location in which they are executed. The concept of code mobility is not new, but in recent years has become a hot topic. Web browsers are able to download programs attached to web pages that are executed locally. On the other hand, mobile agent technology allows for agents to autonomously migrate to new hosts. A major concern involved in the use of these technologies is security: the integrity of the receiving host must not be compromised by the execution of mobile code. The local host needs to define a security policy that specifies which resources are made available to mobile code, potentially untrusted. On the other hand, the runtime system must, somehow, enforce such policy. In this paper, we present a survey of different techniques aimed at resolving the problem of secure resource management, and argue within which context they are appropriate. 相似文献
18.
杨晨 《信息技术与标准化》2011,(3):18-21
企业的信息化、智能化为移动代理的应用提供了广阔的平台,但是移动代理系统安全保障成为制约其应用的关键。从代理保护和代理平台保护两个方面阐述了移动代理系统关键信息安全保障技术,分析了移动代理安全标准化现状,提出了未来移动代理安全保障技术及标准化研究建议。 相似文献
19.
On the road to the future success of mobile agents, we believe that interagent communication is an issue that has not been adequately addressed by the mobile agents community. Supplementing mobile agents with the ability to interact with other mobile or static agents, or agentified information sources is a necessity in the vastly heterogeneous arena in which mobile agents are called to compete. Thus, an agent communication language should be interpreted as a tool with the capacity to integrate disparate sources of information. We argue that mobile agents can benefit from current standards efforts on agent communication since the focus of such work is to address heterogeneity by defining a “common language” for communicating agents. We discuss ongoing research on agent-to-agent communication and present current standards efforts relevant to agent communication 相似文献