6 CONCLUSIONS
In this paper, we proposed a new framework based on
trusted server and developed by IBM platform Aglet
to prevent security issues over mobile agents. The
proposed approach evaluated how different types of
mobile agents can react based on real traces with
attacks. Our experimental results show that the
proposal mobile agent needs approximately 4x more
time than a normal agent to execute its job. This is
cause of the Generation of the keys, encryption of
partial information, verification of destination object
at each visited host and at last collecting the results
back to the Mobile Agent from the TS all add up to
form a big turnaround time. Indeed, we compared the
execution time for all Mobile Agent cases. As the
number of nodes to be visited is increased, we notice
that the turnaround time increases. This is tribute to
the fact that there are more jobs to be done.
In our future work, we will focus on detecting
flooding attacks over mobile agents. We will propose
a new framework for the detection of flooding attacks
by integrating Power Divergence over Sketch data
structure. The performance of the proposed
framework is investigated in terms of detection
probability and false alarm ratio.
We also intend to provide a method for reducing the
amount of monitoring data on high speed networks,
and to analyze the impact of sampling on the
precision of this divergence measure.
REFERENCES
HU, Jiang-Ping, Zhi-Xin LIU, Jin-Huan WANG, Lin
WANG, Xiao-Ming HU. "Estimation, Intervention and
Interaction of Multi-agent Systems." Acta Automatica
Sinica 39, no. 11 (2013): 1796-1804.
Umar Manzoor, Samia Nefti, Yacine Rezgui,
“Categorization of malicious behaviors using ontology-
based cognitive agents”, Data & Knowledge
Engineering, Volume 85, May 2013, Pages 40-56.
Umar Manzoor, Samia Nefti, “iDetect: Content Based
Monitoring of Complex Networks using Mobile
Agents”, Applied Soft Computing, Volume 12, Issue 5,
May 2012, Pages 1607-1619.
Chen, Bo, Harry H. Cheng, and Joe Palen. "Integrating
mobile agent technology with multi-agent systems for
distributed traffic detection and management systems."
Transportation Research Part C: Emerging
Technologies 17, no. 1 (2009): 1-10.
Maria Zubair, Umar Manzoor. “Mobile Agent based
Network Management Applications and Fault-
Tolerance Mechanisms”, The Sixth International
Conference on Innovative Computing Technology
(INTECH 2016)
Mouhammd Alkasassbeh, Mo Add. “Network fault
detection with Wiener filter-based agent”, Journal of
Network and Computer Applications 32(4) (4):824-
833 · July 2009
Talal Rahwan, Tarek Rahwan, Iyad Rahwan, and Ronald
Ashri. “Agent-based Support for Mobile Users using
AgentSpeak(L)”, Agent-Oriented Information Systems
Volume 3030 of the series Lecture Notes in Computer
Science pp 45-60
Tu, Griffel and Lamersdof. “Integration of intelligent and
mobile agent for E-commerce”
Ryszard Kowalczyk, Mihaela Ulieru and Rainer Unland.
“Integrating Mobile and Intelligent Agents in
Advanced e-Commerce: A Survey)”, Agent-Oriented
Information Systems Volume 3030 of the series Lecture
Notes in Computer Science pp 45-60
Jansen W. and Karygiannis “T. Mobile Agent Security”,
National Institute of Standards and Technology,
Gaithersburg, MD 220899.
Rahula Jha, “Mobile Agents for e-commerce”, M. Tech.
Dissertation, IIT Bombay, India, 2002.
Altalayleh, M. and Brankovic, L. “An Overview of Security
Issues and Techniques in Mobile Agents”, University
of NewCastle, Australia.
Danny B. Lange, Mitsuru Oshima. “Mobile Agents with
Java: The Aglet API”, September 1998, Volume 1,
Issue 3, pp 111–121
Sun: Java 2 SDK security documentation. (2003).
Guido J.van 't Noordende, Frances M. T. Brazier, Andrew
S. Tanenbaum. “Security in a Mobile Agent System”,
2004, IEEE Symposium on Multi-Agent Security and
Survivability
Michelle S. Wangham, Joni da Silva Fraga, Rafael R.
Obelheiro. “A Security Scheme for Agent Platforms in
Large-Scale Systems”, 2013, IFIP International
Conference on Communications and Multimedia
Security Mobile, pp 104-116
Gray, R., Kotz, D., Cybenko, G., Rus, “Security in a
multiplelanguage, mobile agent systems”. LNCS 1419.
Springer-Verlag (1998)
Karnik, N. “Security in Mobile Agent Systems”. PhD
thesis, University of Minnesota (1998)