Applying trust policies for protecting mobile agents against DoS
暂无分享,去创建一个
In the world of mobile agents, security aspects are extensively being discussed. Denial of service (DoS) attacks are of considerable interest, i.e., when malicious hosts either delete received agents or prevent them from continuing their route. This paper presents a method for a posteriori identification of such malicious hosts to build a trust policy. Depending on how much the agent owner trusts the hosts, he can either define an appropriate order in which selected hosts should be visited, or he can decide which hosts he does not want to contact again. We also show how the sequence of hosts should be determined in order to minimize some costs.
[1] Fred B. Schneider,et al. Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.
[2] Danny B. Lange,et al. Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .
[3] Nicola Santoro,et al. Mobile Search for a Black Hole in an Anonymous Ring , 2001, DISC.
[4] Jeom Goo Kim,et al. Adaptive Migration Strategy for Mobile Agents on Internet , 2001, TES.