CFP last date
20 December 2024
Reseach Article

Hierarchal Model to Prevent DoS Attack in Mobile Agents

Published on February 2013 by Mayank Aggarwal, Nipur, Pallavi
International Conference on Recent Trends in Information Technology and Computer Science 2012
Foundation of Computer Science USA
ICRTITCS2012 - Number 1
February 2013
Authors: Mayank Aggarwal, Nipur, Pallavi
b8afcc80-59bf-4992-9f93-5d2218de4682

Mayank Aggarwal, Nipur, Pallavi . Hierarchal Model to Prevent DoS Attack in Mobile Agents. International Conference on Recent Trends in Information Technology and Computer Science 2012. ICRTITCS2012, 1 (February 2013), 7-10.

@article{
author = { Mayank Aggarwal, Nipur, Pallavi },
title = { Hierarchal Model to Prevent DoS Attack in Mobile Agents },
journal = { International Conference on Recent Trends in Information Technology and Computer Science 2012 },
issue_date = { February 2013 },
volume = { ICRTITCS2012 },
number = { 1 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 7-10 },
numpages = 4,
url = { /proceedings/icrtitcs2012/number1/10244-1304/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Information Technology and Computer Science 2012
%A Mayank Aggarwal
%A Nipur
%A Pallavi
%T Hierarchal Model to Prevent DoS Attack in Mobile Agents
%J International Conference on Recent Trends in Information Technology and Computer Science 2012
%@ 0975-8887
%V ICRTITCS2012
%N 1
%P 7-10
%D 2013
%I International Journal of Computer Applications
Abstract

Mobile Agents are soft-wares migrating from one node to another to fulfill the task of its owner. Mobile agents are not properly utilized because of security concerns. One such concern is 'Denial of Service', in it the malicious host might deny resources required by the agent and kill the agent, thus the result computed so far is lost and this might happen every time the agent visits any malicious host. This paper is an extension of our work [12] in it we extend the concept to hierarchical model by grouping similar hosts together and finally detects the malicious host to prevent Denial of Service Attack. Simulation is done using CPN tools, Colored Petri Nets (CPNs) is a language for the modeling and validation of systems in which concurrency, synchronization and communication play a major role [3].

References
  1. Antonio Corradi, Marco Cremonini, Rebecca Montanari, and Cesare Stefanelli. Mobile agents integrity for electronic commerce applications. Information Systems, 24(6), 1999.
  2. Cao, Chun andLu, Jian 'Path-history-based access control for mobile agents', International Journal of Parallel, Emergent and Distributed Systems, vol 21: 3, pp 215 — 225 , 2006.
  3. CPN Tools website:www. daimi. au. dk/CPNtools
  4. Dirk Westhoff, Markus Schneider, Claus Unger, and Firoz Kaderali. Methods for protecting a mobile agent's route. In Information Security, Second International Workshop (ISW'99), number 1729 in LNCS. Springer Verlag, 1999.
  5. Dirk Westhoff, Markus Schneider, Claus Unger, and Firoz Kaderali. Protecting a mobile agent's route against collusions. In Selected Areas in Cryptography, 6th Annual International Workshop (SAC'99), number 1758 in LNCS. Springer Verlag, 2000.
  6. Dong Chun Lee and Jeom Goo Kim. Adaptive migration strategy for mobile agents on internet. In Technologies for E-Services (TES 2001), Second International Workshop, Proceedings, number 2193 in LNCS. Springer Verlag, 2001.
  7. Fred B. Schneider. Towards fault-tolerant and secure agentry. In Distributed Algorithms, 11th International Workshop (WDAG'97), Proceedings, number 1320 in LNCS. Springer Verlag, 1997.
  8. Garrigues, C. , et al. Promoting the development of secure mobile agent applications. J. Syst. Software (2009), doi:10. 1016/ j. jss. 2009. 11. 001
  9. Giovanni Vigna. Cryptographic traces for mobile agents. In G. Vigna, editor, Mobile Agents and Security, number 1419 in LNCS. Springer Verlag, 1998.
  10. Lotfi Benachenhou, Samuel Pierre, " Protection of a mobile agent with a reference clone," Elsevier , Computer Communications , vol 29, pp. 268-278, 2006.
  11. M. Aggarwal,Nupur,Pallavi, " Protecting Dynamic Mobile Agent against Denial of Service Attacks",AIP,Conference Proceedings,1324 (316),pp 316-318,2010.
  12. M. Aggarwal, Nipur , Pallavi , Simulation of Dynamic Moble Agent Model to pevent denial od service attack, international journal of computer applications. Vol 20 (1), 2011
  13. M. Schenider, B. Cubaleska "A method of protecting mobile agents against denial of service attacks" , Springer-Verlag Berlin Heidelberg, LNAI 2446, pp. 297–311, 2002.
  14. N. Desai,K. Garg,M. Mishra, Modelling Hierrarchical Mobile Agent Security Prorotocol Using CP Nets, Springer-Verlag Berlin Heidelberg, LNCS 4873, pp 637-649,2007.
  15. Price, Sean M. 'Host-Based Security Challenges and Controls: A Survey of Contemporary Research', Information Security Journal: A Global Perspective, vol 17: 4, pp 170 — 178, 2008.
  16. Stefan Dobrev, Paola Flocchini, Guiseppe Prencipe, and Nicola Santoro. Mobile search for a black hole in an anonymous ring. In Distributed Computing (DISC 2001), 15th International Conference, Proceedings, number 2180 in LNCS. Springer Verlag, 2001.
  17. Tomas Sander and Christian F. Tschudin. Protecting mobile agents against malicious hosts. In G. Vigna, editor, Mobile Agents and Security, number 1419 in LNCS. Springer Verlag, 1998.
  18. Venkatesan S, et al. "Advanced mobile agent security models for code integrity and malicious availability check. ", J Network Comput Appl, doi:10. 1016/j. jnca. 2010. 03. 010 ,2010.
  19. W. A. Jansen, "Countermeasures for mobile agent security," Elsevier, Computer Communications, vol. 23 , pp. 1667-1676 , 2000
Index Terms

Computer Science
Information Sciences

Keywords

Hierarchal Model Mobile Agent Denial Of Service Attack Colored Petrinets Group In Charge