Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems Part 2 - AAMAS '02 2002
DOI: 10.1145/544862.544894
|View full text |Cite
|
Sign up to set email alerts
|

Detecting anomalous agents in mobile agent system

Abstract: Mobile agents are easy to be attacked. Although traditional security methods (authentication, encryption, etc.) can protect them from certain kinds of attacks, mobile agent can still be exploited for illegal purpose. In our approach, we propose an anomaly detection model for detecting malicious agents. We analyze mobile agent's activity by measuring its movement pattern and residence time on hosts in this preliminary approach. We classify the normal agent tracks and predict the next agent's hop. We do experime… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2006
2006
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…PolyU 25211321), and CCF-Huawei Populus Grove Fund. A preliminary version of this paper appeared in the Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems, 2020 (Li & Li, 2020). This full version includes all proofs that were omitted from the conference version as well as refined analysis and additional complexity results.…”
Section: Acknowledgmentsmentioning
confidence: 99%
“…PolyU 25211321), and CCF-Huawei Populus Grove Fund. A preliminary version of this paper appeared in the Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems, 2020 (Li & Li, 2020). This full version includes all proofs that were omitted from the conference version as well as refined analysis and additional complexity results.…”
Section: Acknowledgmentsmentioning
confidence: 99%
“…However the autonomy and distributiveness of multi-agent systems require the agents to communicate and cooperate among themselves, to tackle the threats faced by them. T.Y Li and K.Y Lam [22] gave an anomaly detection model for detecting malicious agents, that analyzes mobile agents activity by measuring its movement pattern and residence time on hosts. Observation shows that majority of the agents follow some regular behavior patterns.…”
Section: Structural Specification Of Alert-bdimentioning
confidence: 99%
“…Based on anomaly detection, the author used the route and execute time that mobile agent executed on the host to detect abnormal on mobile agent [3].According to the author, in a closed mobile agent system,1)the route of mobile agent is infrequently changed;2)and the execution time is stable on each host. The abnormal will be detected based on these characters.…”
Section: Introductionmentioning
confidence: 99%
“…Based on these promises, the migrating workflow engine plans the route for migrating instance. In this paper, we follows the idea in [3] to take the route and executing time on the host of migrating instance as normal pattern, then we use security proxy agent to evaluate the security on the next hop of migrating instance to help the migrating instance evade the danger zone initiatively. The rest of the paper is organized as follow: Section 2 shows the model for migrating instance to detect danger initiatively; Section 3 we give some definitions; Section 4 details the proposed protocol to detect danger hosts and finally, some conclusions can be found in Section 5.…”
Section: Introductionmentioning
confidence: 99%