首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 140 毫秒
1.
移动的代码在开放的、没有范围限制的网络环境下不利于对其进行控制。为了适应开放的网络环境,提出了移动代理的新的实现模型,旨在将移动代理技术更实用化。作者提出的新模型,将移动代理分解成移动指令和静态代理两个部分,由移动平台中静态代理帮助移动Agent实现传统方法实现移动Agent全部功能,具有较少的安全隐患和更强大的功能。  相似文献   

2.
针对移动代理在异质网络环境中的安全问题,提出了一种代码迷乱转换保护策略.代码迷乱技术应用于移动代理,是对执行任务的移动代理的保护和隐藏模式的探索.该方案首先提出基于交叉循环迷乱和改变数据关联的移动代理保护策略,接着阐述了交叉循环迷乱、多模块交叉循环迷乱以及改变数据之间内在关联的具体方法.实验证明,该方案成功抵御了给定的7个 java 解码程序,显示出比多层退出迷乱和单层退出迷乱方法的有效性.  相似文献   

3.
研究了智能移动代理在网管领域的应用优势,包括降低网络负载和延时、自主执行、动态适应环境、异构性、协作性等方面。接着设计了移动代理软件,移动代理软件由应用接口模块、移动代理模块、信息转换模块和信息传输模块组成。具有应用需求输入、移动代理管理功能,同时基于JAVA语言开发,具有跨平台能力。并将移动代理与群管理相结合,研究了工作原理。最后附实例验证。  相似文献   

4.
日益复杂和分布的入侵使得传统的人侵检测系统无法满足用户的需求,迫切需要采用新的方法来提高入侵检测系统的效率。针对本单位局域网特点,本文主要提出了一种基于移动代理技术的分布式入侵检测系统设计方案,该方案使用了协议分析和模式匹配相结合的方法,有效地缩小了目标的匹配范围,提高了检测速度;在决策过程中引入了关联分析模块和情报代理模块,能够更好的发现多个攻击之间的内在联系。经测试表明,该方案可以有效地降低误报率,较好地应对分布式拒绝服务攻击。  相似文献   

5.
杨劲山  余蓁 《电子科技》2001,(21):30-30
1、引言 如何有效利用网络计算资源?如何提高网络通信性能、信息获取能力和系统响应速度,如何提高系统容错能力和系统可扩充性和适应性?许多在小规模网络内适用的模型、算法随着网络规模的扩大,其性能已越来越不能满足新需求了。所有这些都给传统分布式系统所常用的Client/Server模式提出了新的挑战。 移动代理作为一种新的分布式计算技术为上述问题的解决提供了新的途径,从本质上说,移动代理是一个功能相时独立,可以动态改变与其执行环境联接的代码片断。它是自冶的、异步的、具有智能化的软件实体,可以动态植入(漫…  相似文献   

6.
基于PKI的移动代理安全策略研究   总被引:1,自引:0,他引:1  
移动代理是新型的分布式计算技术,具有移动性和自治性两个特点,与传统的分布式计算模型Client/Server相比具有非常多的优势,有着广阔的应用前景,但安全问题一直困扰着移动代理的应用。针对移动代理系统所受的安全威胁以及带来的安全需求,提出了一种用PKI来实现移动代理系统安全性的方法,并分析了该方法的优点和有待改进的地方。  相似文献   

7.
移动代理是一种新兴的网络技术,它提供了一个新的计算方式,在网络分布式环境中有着极为重要的作用。随着移动软件混合性的增加,也伴随着对安全的威胁。保护移动代理的代码及数据免受窜扰已成为移动代理能正常运行的关键。传统的密码机制不能直接应用到移动代理环境,考虑到移动代理的动态性和智能性等特点,提出了一种基于异步执行机制的新型移动代理方案,以增强移动代理和其执行环境的安全可靠性、最后对其做了安全分析和性能分析。  相似文献   

8.
9.
基于JavaCard的移动代理安全模型研究   总被引:3,自引:0,他引:3  
欲阻止恶意主机攻击移动代理,代理中的代码信息和数据信息必须被隐藏起来。同时,还要使它们对于执行环境来说是可访问和可执行的。现有措施大都采用软件方法(如密码技术),但并不足以解决恶意主机问题。一个完全不同的方法就是使用可信赖的且可抵御攻击的JavaCard来保护移动代理。本文讨论用JavaCard保护移动代理的机理,同时给出我们所设计的一个JavaCard的安全模型。  相似文献   

10.
RBRS:一种基于角色的移动代理协作模型   总被引:2,自引:0,他引:2       下载免费PDF全文
李钢  李增智  王宇  王立 《电子学报》2002,30(5):636-639
在基于移动代理的应用中,相关的协作机制扮演着一个非常重要的作用,但当前的各种协作模型并不能很好的满足移动代理对协作的要求.本文提出了一种基于角色的协作思想,其核心就是将协作功能从移动代理的实现中分离出去,然后详细介绍了利用这种思想所实现的一个协作模型:RBRS,最后通过一个应用实例表明,这种功能的分离不但简化了代理的设计和实现,而且提高了整个系统可扩充性.  相似文献   

11.
To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobile 2D code as the interface and dynamic password as the core.First,the actuator pool of the authentication server was constructed.Then,a central controller consisting of functional modules such as input distribution agent,selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally,a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method,and at the same time,it can be used in combination with other authentication methods.  相似文献   

12.
Mobile agents are software entities consisting of code, data, and state that can migrate autonomously from host to host executing their code. In such scenario there are some security issues that must be considered. In particular, this paper deals with the protection of mobile agents against manipulation attacks performed by the host, which is one of the main security issues to solve in mobile agent systems. This paper introduces an infrastructure for mobile agent watermarking (MAW). MAW is a lightweight approach that can efficiently detect manipulation attacks performed by potentially malicious hosts that might seek to subvert the normal agent operation. MAW is the first proposal in the literature that adapts software watermarks to verify the execution integrity of an agent. The second contribution of this paper is a technique to punish a malicious host that performed a manipulation attack by using a trusted third party (TTP) called host revocation authority (HoRA). A proof‐of‐concept has also been developed and we present some performance evaluation results that demonstrate the usability of the proposed mechanisms. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

13.
Mobile agent security   总被引:2,自引:0,他引:2  
The agent paradigm is currently attracting much research. A mobile agent is a particular type of agent with the ability to migrate from one host to another, where it can resume its execution. We consider security issues that need to be addressed before multi-agent systems in general, and mobile agents in particular, can be a viable solution for a broad range of commercial applications. This is done by considering the implications of the characteristics given to agents and the general properties of open multi-agent systems. The paper then looks in some more detail at security technology and methods applicable to mobile agent systems.  相似文献   

14.
Building reusable mobile agents for network management   总被引:7,自引:0,他引:7  
Mobile agents can migrate among nodes to perform a set of management tasks at each of the visited nodes. Existing mobile agent-based network management systems often assume that their mobile agents are designed to work in particular networks to raise the efficiency of agent migration among multiple nodes. Unfortunately, such mobile agents cannot be reused in different networks. This paper proposes a framework where a mobile agent for network management is composed of two kinds of software components, an itinerary part and a behavioral logic part. Both components are implemented as mobile agents. The former is a carrier designed for particular networks, and it can efficiently navigate other mobile agents among nodes in its target network. The latter defines management tasks performed at each node independently of any local network. This framework allows a mobile agent for network management to be reused in various networks without being modified. A prototype implementation of this framework and its application were built on a Java-based mobile agent system.  相似文献   

15.
The practicality of mobile agents hinges on realistic security techniques. Mobile agent systems are combination client/servers that transport, and provide an interface with host computers for, mobile agents. Transport of mobile agents takes place between mobile agent systems, which are located on heterogeneous platforms, making up an infrastructure that has the potential to scale to the size of any underlying network. Mobile agents can be rapidly deployed, and can respond to each other and their environment. These abilities expose flaws in current security technology. This article surveys the risks connected with the use of mobile agents, and security techniques available to protect mobile agents and their hosts. The inadequacies of the security techniques developed from the information fortress model are identified. They are the result of using a good model in an inappropriate context (i.e. a closed system model in a globally distributed networking computing base). Problems with commercially available techniques include: (1) conflicts between security techniques protecting hosts and mobile agents, (2) inability to handle multiple collaborative mobile agents, and (3) emphasis on the credentials of software instead of on the integrity of software to determine the level of trust.  相似文献   

16.
Agents need resources and protection from hostile influences, in both natural and artificial environments. This paper specifically considers social insects and software mobile agent systems, in order to understand how the need for mobility, resource acquisition and security can influence the design and operation of agent systems. Evolution has honed the movement, resource-gathering and defensive skills of the social insects in a multitude of ways. The paper reviews some of these strategies and assesses whether they may provide useful insights into the design and implementation of mobile software agents. This process is necessary as current mobile agent systems have been handicapped by a lack of convincing security measures which has prevented their adoption in mainstream computing services.This paper therefore examines the strategies for movement, resource acquisition and defence adopted by the social insects and considers how they may be applied to enhance the design of mobile agents.  相似文献   

17.
Code mobility can be defined as the capability to dynamically change the bindings between code fragments and the location in which they are executed. The concept of code mobility is not new, but in recent years has become a hot topic. Web browsers are able to download programs attached to web pages that are executed locally. On the other hand, mobile agent technology allows for agents to autonomously migrate to new hosts. A major concern involved in the use of these technologies is security: the integrity of the receiving host must not be compromised by the execution of mobile code. The local host needs to define a security policy that specifies which resources are made available to mobile code, potentially untrusted. On the other hand, the runtime system must, somehow, enforce such policy. In this paper, we present a survey of different techniques aimed at resolving the problem of secure resource management, and argue within which context they are appropriate.  相似文献   

18.
企业的信息化、智能化为移动代理的应用提供了广阔的平台,但是移动代理系统安全保障成为制约其应用的关键。从代理保护和代理平台保护两个方面阐述了移动代理系统关键信息安全保障技术,分析了移动代理安全标准化现状,提出了未来移动代理安全保障技术及标准化研究建议。  相似文献   

19.
On the road to the future success of mobile agents, we believe that interagent communication is an issue that has not been adequately addressed by the mobile agents community. Supplementing mobile agents with the ability to interact with other mobile or static agents, or agentified information sources is a necessity in the vastly heterogeneous arena in which mobile agents are called to compete. Thus, an agent communication language should be interpreted as a tool with the capacity to integrate disparate sources of information. We argue that mobile agents can benefit from current standards efforts on agent communication since the focus of such work is to address heterogeneity by defining a “common language” for communicating agents. We discuss ongoing research on agent-to-agent communication and present current standards efforts relevant to agent communication  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号