Skip to main content

Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts

  • Conference paper
Mobile Agents for Telecommunication Applications (MATA 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2881))

Abstract

Mobile agents are software entities that consist of code, data and state, and that can migrate autonomously from host to host performing some actions on behalf of a user. Security issues restrict the use of code mobility despite its benefits. The protection of mobile agents from the attacks of malicious hosts is considered by far the most difficult security problem to solve in mobile agent systems. In this paper the authors present the implementation and the performance evaluation of a new protocol for detecting suspicious hosts in the mobile agent environment. The protocol is based on limiting the execution time of mobile agents in the executing hosts and was previously presented in [6]. The authors also present how this protocol can improve the usability of the cryptographic traces approach [12].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Java Cryptography Extension (JCE). Institute for Applied Information Processing and Communication of the Graf University of Tecnology, http://jce.iaik.tugraz.at/download/evaluation/index.php

  2. Java Development Kit, http://java.sun.com/downloads/

  3. SourceForge projects, Aglet Software Development Kit (ASDK), http://wwww.sourceforge.net/projects/aglets

  4. Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic security for mobile code. In: IEEE Symposium on Security and Privacy (2001)

    Google Scholar 

  5. Cachin, C., Camenisch, J.L., Kilian, J., Müller, J.: One-round secure computation and secure autonomous mobile agents. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol. 1853, p. 512. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  6. Esparza, O., Soriano, M., Muñoz, J.L., Forné, J.: A protocol for detecting malicious hosts based on limiting the execution time of mobile agents. In: IEEE Symposium on Computers and Communications - ISCC 2003 (2003)

    Google Scholar 

  7. Esparza, O., Soriano, M., Muñoz, J.L., Forné, J.: Host Revocation Authority: a Way of Protecting Mobile Agents from Malicious Hosts. In: Cueva Lovelle, J.M., Rodríguez, B.M.G., Gayo, J.E.L., Ruiz, M.d.P.P., Aguilar, L.J. (eds.) ICWE 2003. LNCS, vol. 2722, Springer, Heidelberg (2003)

    Google Scholar 

  8. Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, p. 92. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  9. Riordan, J., Schneier, B.: Environmental Key Generation Towards Clueless Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, p. 15. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  10. Roth, V.: Mutual protection of cooperating agents. In: Secure Internet Programming: Security Issues for Mobile and Distributed Objects. LNCS, vol. 1906, Springer, Heidelberg (1999)

    Google Scholar 

  11. Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, p. 44. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  12. Vigna, G.: Cryptographic traces for mobile agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, p. 137. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  13. Yee, B.S.: A sanctuary for mobile agents. In: DARPA workshop on foundations for secure mobile code (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Esparza, O., Soriano, M., Muñoz, J.L., Forne, J. (2003). Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts. In: Horlait, E., Magedanz, T., Glitho, R.H. (eds) Mobile Agents for Telecommunication Applications. MATA 2003. Lecture Notes in Computer Science, vol 2881. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39646-8_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39646-8_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20298-1

  • Online ISBN: 978-3-540-39646-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics