2019
DOI: 10.14569/ijacsa.2019.0100828
|View full text |Cite
|
Sign up to set email alerts
|

A Survey: Agent-based Software Technology Under the Eyes of Cyber Security, Security Controls, Attacks and Challenges

Abstract: Recently, agent-based software technology has received wide attention by the research community due to its valuable benefits, such as reducing the load on networks and providing an efficient solution for the transmission challenge problem. However, the major concern in building agent-based systems is related to the security of agents. In this paper, we explore the techniques used to build controls that guarantee both the protection of agents against malicious destination machines and the protection of destinat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 13 publications
(18 citation statements)
references
References 58 publications
0
17
0
1
Order By: Relevance
“…In addition, many issues should be taken into consideration during the preprocessing phase, such as ensuring data privacy [28,29,30,31]. Moreover, enhancing the performance using high performance computing techniques [32] as well as ensuring the security of the data using some hiding or blurring techniques is required [33], or employing agent based software technology for solving transmission challenge problem [34]. The previous issues do not be taken into consideration in this work, and they will be manipulated as a future work.…”
Section: B Used Data Setmentioning
confidence: 99%
“…In addition, many issues should be taken into consideration during the preprocessing phase, such as ensuring data privacy [28,29,30,31]. Moreover, enhancing the performance using high performance computing techniques [32] as well as ensuring the security of the data using some hiding or blurring techniques is required [33], or employing agent based software technology for solving transmission challenge problem [34]. The previous issues do not be taken into consideration in this work, and they will be manipulated as a future work.…”
Section: B Used Data Setmentioning
confidence: 99%
“…Both the strengths and weaknesses of ABST come from the features of the agent as follows: (1) Adaptability, which means platform independence, whereby the agent can be executed on different machines with different operating systems; (2) Transparency and accountability, which means that the software agent runs on behalf of its owner, and the owner can ask the agent about both its current location and what has been accomplished; (3) Ruggedness, which enables the agent to run given low or high resources, interpreting different data formats; and (4) Mobility, which is a unique property of this technology. This means that the agent can The first three features of ABST (i.e., adaptability, transparency and accountability, and ruggedness) make it a powerful technology.…”
Section: Statement Of Problemmentioning
confidence: 99%
“…Since the DM has full control over the visiting mobile agent, it has the ability to tamper with the results of the executed mission, which in turn leads to loss of result integrity, or even the whole code (behavior of the agent). Moreover, the attacker (DM) can apply advanced attacks, such as alternation attacks [11], collusion attacks [12,13], and denial of service (DoS) attacks [2,14]. Furthermore, some malwares and advanced persistent threats can be easily distributed to steal data from the visiting agents [15,16].…”
Section: Statement Of Problemmentioning
confidence: 99%
See 2 more Smart Citations