Change search
ReferencesLink to record
Permanent link

Direct link
Framework for Securing Mobile Software Agents
KTH, School of Information and Communication Technology (ICT).
KTH, School of Information and Communication Technology (ICT).
2006 (English)In: Proceedings of the ISSA 2006 from Insight to Foresight Conference, ACM Sigmod , 2006Conference paper (Refereed)
Abstract [en]

Information systems are growing in size and complexity making it infeasible for human administrators to manage them. The aim of this work is to study ways of securing and using mobile software agents to deter attackers, protect information systems, detect intrusions, automatically respond to the intrusions and attacks, and to produce recovery services to systems after attacks. Current systems provide intrusion detection, prevention, protection, response, and recovery services but most of these services are manual and the reaction time is usually from a number of hours to days depending on the complexity of the systems. There are efforts of using mobile software agents to provide these services automatically, thereby reducing reaction time, but the technology is not widely accepted due to security issues of mobile agents.

In this work, we have created a framework for securing mobile software agents in information systems. Communication security between platforms, protection of the baggage carried by agents, and protection of agents are provided. The framework has five components: deterrence, protection, detection, response and recovery sub-systems. The framework has been partially implemented and has an interface for administrators, monitored systems, NIST vulnerability database, patches‘ database, sensors, and Secure Mobile agents Run-Time System. This framework provides security for mobile agents at different levels and this increases trust in agents‘ technology. The response time, after intrusions are detected, is shortened. The framework helps systems to adapt by improving the performance of new generations of agents.

Place, publisher, year, edition, pages
ACM Sigmod , 2006.
Keyword [en]
Software mobile agents, deterrence, neural networks, immune system, genetic algorithm, feedback mechanism
National Category
Computer and Information Science
URN: urn:nbn:se:kth:diva-34477OAI: diva2:421707
QC 20110609Available from: 2011-06-09 Created: 2011-06-09 Last updated: 2011-06-09Bibliographically approved

Open Access in DiVA

fulltext(421 kB)138 downloads
File information
File name FULLTEXT01.pdfFile size 421 kBChecksum SHA-512
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Mwakalinga, G JeffyYngström, Louise
By organisation
School of Information and Communication Technology (ICT)
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 138 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 47 hits
ReferencesLink to record
Permanent link

Direct link