SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
AN ENHANCED APPROACH FOR SECURING MOBILE AGENTS FROM 
THE ATTACK OF OTHER MALICIOUS MOBILE AGENTS 
Asha Anil1, Jesna Anver2 
1PG Student, 2Associate Professor, Department of Computer Science and Engineering, Toc H Institute of Science and 
Technology, Kerala, India 
Abstract 
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is beginning to move toward developing 
techniques that are oriented towards protecting the agent. Agent technology has been used in many critical applications like business 
process management, e-commerce, artificial intelligence, distributed processing etc. The mobile agent technology has encountered 
many security threats during the itinerary period .The security schemes presented in this paper for mobile agent address the code, 
data and itinerary security issues. An environment that protects the legitimate mobile agent from the malicious mobile agent is 
provided. A checksum method is used to detect a malicious mobile agent which is appending to a legitimate mobile agent. The 
confidentiality of the data that are retrieved from each remote server is ensured by encryption mechanisms. The itinerary is also 
protected by allowing only registered users to create new mobile agents and is controlled by a central co-coordinator. Thus an 
enhanced security mechanism is presented to protect the mobile agent’s code, data and route. 
Keywords: Mobile Agent, Security Threats, Central Co-ordinator, Checksum Method 
----------------------------------------------------------------------***------------------------------------------------------------------------ 
1. INTRODUCTION 
A software agent is program that acts as a user’s personal 
assistant and is classified as static agents and mobile agents. 
Static agents execute on a single machine to achieve their goal 
Software agents which have the property of mobility are called 
mobile agents and they perform a user’s task by migrating and 
executing on several hosts connected to the network. Mobility 
increases the functionality of the mobile agent and allows the 
mobile agent to perform tasks beyond the scope of static 
agents. An agent is defined as “a person whose job is to act 
for, or manage the affairs of, other people. In the context of 
computers, software agents refer to programs that perform 
certain tasks on behalf of the user. Imagine that we want to go 
on a trip to a new holiday destination. We contact your travel 
agent program and describe our preferences and our 
constraints. The program suggests where we can spend our 
holidays after taking into consideration several information 
sources such as flight timings, guides and verifying the 
availability of tickets and hotel rooms etc. When we confirm 
our destination, the program books the flight tickets and 
reserves the hotel rooms for us. Thus the software agent acts 
as our personal assistant and they exhibit certain properties, 
such as: autonomy – they act without the need of constant 
human supervision, sociability – the ability to interact with 
other agents if necessary, reactivity – ability to react to 
changes in the environment, proactivity – taking initiative at 
needed times, in order to reach objectives. 
2. RELATED WORKS 
The existing system provides mobile agent authentication at 
each host. This ensures that the mobile agent is dispatched by 
the intended sender only. But the integrity of the code is not 
guaranteed. Any receiver can confirm the identity of the 
sender but not the content of the code. There is a possibility of 
malicious mobile agent appending itself with the legitimate 
mobile agent without modifying or altering the contents of the 
code. The verifying process only verifies for sender's 
authentication and not the integrity of code. In overall there is 
a lack in available security system that provides security for 
itinerary details, data and particularly mobile agents' code. 
Also in the existing system, there is no mechanism for 
authentication checking and the agent verification is done 
through checking agent size. If the agent size exceeds a 
particular limit, kill that agent. But it may not be suitable in all 
cases. 
Over the years computer systems have evolved from 
centralized monolithic computing devices supporting static 
applications, into networked environments that allow complex 
forms of distributed computing. A new phase of evolution is 
now under way based on software agents. 
A software agent is loosely defined as a program that can 
exercise an individual’s or organization's authority, work 
autonomously toward a goal, and meet and interact with other 
agents. 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 16
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
Wayne A. Jansen et al. [1] proposed a number of models exist 
for describing agent system, however, for discussing security 
issues it is sufficient to use a very simple one, consisting of 
only two main components: the agent and the agent platform 
and have summarized the various methods devised for 
protecting the agent platform such as Software-Based Fault 
Isolation, Safe Code Interpretation, Signed Code, State 
Appraisal, Proof Carrying Code etc and more general-purpose 
techniques for protecting an agents such as Host Revocation 
Authority, Execution Tracing ,Obfuscated Code, Ajanta 
System, Partial Result Encapsulation, Environment Key 
Generation etc. 
Ibharalu et.al [2] proposed reliable protection architecture 
using Travel Diary Protection Scheme and Platform Registry 
which allows and protects mobile agents to roam freely in 
open networks environment without being attacked by 
malicious hosts. The paper focuses on securing free-roaming 
agents in open network environments and presents a novel 
security protocol which has fine function in preventing 
attacks. J.M.Gnanasekar et.al [3] has proposed a number of 
solutions for securing data section in a mobile agent from 
discovery and exploitation by a malicious host are proposed 
based on cryptographic principles have their own limitations. 
The cryptographic key generation and distribution mechanism 
strongly holds the success of the mobile agent security 
systems. The agents and hosts are mutually distrusting each 
other, but they trust the third parties. In the paper [3], this 
property is exploited for the secure way of generating and 
distributing the keys using service oriented architecture. The 
major security future for mobile agent, the Publicly Verifiable 
and Forward Integrity (PVFI) and Forward Privacy (FP) are 
also ensured. 
Tarig Mohamed et.al in [4] has proposed a Secure-Image 
Mechanism (SIM) to protect mobile agents against malicious 
hosts. SIM aims to protect mobile agent by using the 
symmetric encryption and hash function in cryptography 
science. This mechanism can prevent the eavesdropping and 
alteration attacks. The main benefit of this mechanism is to 
allow the mobile agent to continue its journey without 
problem in case these types of attacks occurred. The paper [4] 
presents some solution proposed by research in the area of the 
mobile agent protection and explains the symmetric 
encryption and hash function concept. 
Abolfazl esfandi et.al in [5] has proposed a mobile agent 
security in multi agent environments using a multi agent-multi 
key approach .In paper [5] they consider the problem of 
keeping sensitive data and algorithms contained in a mobile 
agent from discovery and exploitation by a malicious host. 
They illustrate a novel distributed protocol for multi agent 
environments to improve the communication security in 
packet switched networks. To enrich the overall system 
security the approach makes use of distribution and double 
encryption and some other traditional methods such as digital 
signature. In this approach the encrypted private key and the 
message are broken into different parts carrying by different 
agents which makes it difficult for malicious entities to mine 
the private key for message encryption, while the private key 
for the encrypted key is allocated on the predetermined 
destination nodes. On the other hand, all of the previously 
proposed encryption algorithms can be applied in their 
proposed approach that deteriorates the key discovery process. 
To improve the overall security, the paper makes use of 
Advanced Encryption Standard (AES) as the encryption base 
for message encryption. The paper also presents some 
evaluation discussions presenting time overhead analysis and 
crack probability. 
Muhammad Awais Shibli et.al [6] has proposed MAGICNET: 
security system for development, validation and adoption of 
mobile agents .The research in the area of mobile agents’ 
security mainly deals with protection and security for agents 
and agents’ runtime platforms. Sarwarul et.al [7] has proposed 
a mechanism for security of mobile agent in ad hoc network 
using threshold cryptography .One of the main advantages of 
using Mobile Agent in a network is it reduces network traffic 
load. In an ad hoc network Mobile Agent can be used to 
protect the network by using agent based IDS 
.Tarig mohamed et .al [8] has proposed a sub-agent 
mechanism to protect mobile agent privacy this paper a new 
mechanism called Generated Sub-Agent Mechanism (GSAM) 
to protect mobile agent against malicious Hosts The main idea 
behind GSMA is to generate a sub-mobile agent from the 
mobile agent in case the mobile agent will visit an untrusted 
host. The sub-mobile agent visits the untrusted host instead of 
the mobile agent. 
M. Vigilson Prem et.al [9] has proposed agent sizing method 
to prevent the entry of a malicious mobile agent. . But it is not 
suitable for most of the cases as a malicious agent with the 
same size may get attached to the legitimate mobile agent. 
3. EXISTING SYSTEM 
In the existing system, verification was done with the help of 
agent sizing. If the size of mobile along with the data is larger 
than the critical section buffer, it is expelled out of the system. 
The mobile agent was kept in 'deactivated' state while this 
check is performed. This restricts the mobile agent not to 
perform any malicious action inside the host and thus protects 
the host platform from malicious activities of mobile agent. In 
case, the mobile agent fails this test, it is killed immediately 
inside the critical section itself. Further, at this stage only, the 
append entry attack is detected. If there is an increase in size 
of the agent against the size fixed at the sender's side, illegal 
entry of mobile code is detected. 
On detecting this attack, the mobile agent is destroyed 
immediately based on malicious reasons. Otherwise the 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 17
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
mobile agent is allowed to execute in its execution 
environment.ie, here agent verification is done through 
checking agent size. If the agent size exceeds a particular 
limit, kill that agent. But it is not suitable for most of the cases 
as an malicious agent with the same size may get attached to 
the legitimate mobile agent either by deleting some parts of it 
or by replacing the agent. 
4. PROPOSED SYSTEM 
Our proposed system provides an environment that protects 
the legitimate mobile agent from the malicious mobile agent. 
The general architecture of the system for an information 
retrieval application with fault tolerant and security model is 
shown in figure 1. Web service is requested to plan and select 
dynamically, the next host to visit, based on parameters like 
size of data, aliveness, bandwidth. The authorized user 
submits his request, for example, an information retrieval 
request, to the mobile agent system. The agent creator creates 
the agent and the agent verification, data verification and path 
management are done by web service module. If verified, the 
data collection or actions if any are performed and the agent 
migrates to the next host and reaches back to the end user On 
arrival at each host, the mobile agent undergoes security check 
and on success the mobile agent is allowed to execute in the 
environment. 
Fig -1: Overall architecture of the proposed system 
4.1 Authentication Checking 
The modified system proceeds using following steps 
a. Creating Mobile Agents: - only registered users can 
create mobile agents 
b. Agent Registration: - After creating mobile agents, 
mobile agents are registered to central mobile coordinator. 
During registration phase, creator send agent checksum, 
agent name, migration path are sent to this coordinator 
c. Modify Mobile Agent Running platform :- In existing 
system, running environment checking agent size only for 
verification. But in our new environment, after receiving a 
mobile agent, the running environment sent its checksum 
and agent code to central coordinator. Central coordinator 
checks its integrity and status code to running 
environment. If this is a success, then running 
environment start mobile agent otherwise kills that agent 
4.2 Checksum Method 
The agent creator creates a mobile agent, and find its 
corresponding checksum and send the checksum to the central 
coordinator. It also sends the new path to the central 
coordinator if any new path change is found. The agent 
observer is a server that is distributed over different regions 
and its function is to monitor the movement of mobile agent in 
its corresponding region. It also acts as a service provider that 
services the requests related to those mobile agents. The 
agents generated at each host must be registered with agent 
observer and only the registered mobile agents are allowed to 
access the critical section. On successful completion of the 
task, the mobile agent is dispatched to next host after finding 
the proper host to migrate. 
Following are the main steps of Agent Observer 
a. Create an agent Observer 
b. Receive messages from mobile agents 
After the agent observer check authentication of request and 
sender agent, it returns data corresponding to agent request 
4.3 Data Collection and Protection 
The data collected from one server must be secure and should 
not be known to others. To implement this constraint, every 
server will encrypt its data using the owner's public key. The 
owner's public key is obtained by decrypting the segment 
received from previous server using receiver's private key and 
each data packet is encrypted using owner's public key. At the 
same time, the data packet can be decrypted only by the owner 
and these packets can only be opened in the correct order, 
since the symmetric key used to decrypt an envelope is 
protected inside the previous packet 
The data packet received by any receiver is encrypted using 
owner's public key .On successful completion of task, the 
mobile agent appends the result with this packet and the new 
look packet is encrypted again using owner's public key 
Also a checksum is also calculated for the data to provide 
additional security so that upon receiving the node where the 
data is collected it can check the integrity of the data by this 
new method 
4.4 Path Migration 
The web service is the central coordinator who keeps track of 
the path changes and holds the value of checksum of mobile 
agent.The details about the next host to be visited is controlled 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 18
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
by the web service. Also the web service keeps track of the 
path modification if any in a dynamic itinerary 
5. WORKING OF THE PROPOSED MODEL 
The entire working of our system with data and Agent 
verification is illustrated by a block diagram in Fig 2. The 
entire working of our system with data and Agent verification 
is illustrated by a block diagram in Fig 2.The figure describes 
how an agent is created, verified, and migrated. The agent is 
verified by a checksum mechanism and the data collected is 
also secured by a series of encryption mechanisms. Also the 
next path to be taken is obtained from the web server or the 
central coordinator and ultimately reaches the end user. 
Fig -2: Block Diagram of the entire system 
5.1 Algorithm 
Step 1: Create a mobile agent by a registered user. 
Step 2: Register the mobile agents with the web server. 
Step 3: Verify the authenticity of agent with the help of 
checksum method 
Step 4: Perform the operation required or collect the data from 
the intermediate hosts and encrypt the data by any encryption 
mechanism 
Step 5: Verify the data collected. 
Step 6: Obtain the next path from the central coordinator and 
choose the next host to be visited. 
Step 7: Perform Agent Migration 
Step 8: Stop 
6. CONCLUSIONS 
The area of mobile agent security is in a state of immaturity, 
but rapidly improving. The traditional orientation toward host-based 
security persists and, therefore, available protection 
mechanisms tend to focus on protecting the agent platform. 
Emphasis is beginning to move toward developing techniques 
that are oriented toward protecting the agent, a much more 
difficult problem. There are a number of agent-based 
application domains for which basic and conventional security 
techniques should prove adequate mobile agent technology is 
intriguing and offers a new paradigm for application 
development 
Agent technology has been used in many critical applications 
such as personal information management, electronic 
commerce, business process management, artificial 
intelligence, interface design, distributed processing and 
distributed algorithms. Besides its bright side, the technology 
has encountered many security threats. These problems are 
faced during the itinerary period of an agent traversing from 
platform to platform in the network. The unexpected failure or 
change in network components or status makes the static 
planning not a best option and makes the mobile agent users to 
opt for dynamic itinerary. But the problem is that the itinerary 
details are open to all hosts. But for secure transaction 
applications, the itinerary details must not be known to any 
other hosts in the network 
The data collected from each host must be protected from any 
other host .Only the owner of the agent is allowed to decrypt 
the encrypted data at each host. More importantly, the existing 
provides mobile agent authentication at each host. This 
ensures that the mobile agent is dispatched by the intended 
sender only. But the integrity of the code is not guaranteed. 
Any receiver can confirm the identity of the sender but not the 
content of the code. There is a possibility of malicious mobile 
agent appending itself with the legitimate mobile agent 
without modifying or altering the contents of the code. The 
verifying process only verifies for sender's authentication and 
not the integrity of code. In overall there is a lack in available 
security system that provides security for itinerary details, data 
and particularly mobile agents' code. This situation has given 
the motivation to present a three dimensional security model 
that protects mobile agent from malicious agents' passive 
attack, data and itinerary details from executing hosts 
In our proposed system we are providing security for agent’s 
code, data as well as path through a series of encryption 
mechanism. The code of the mobile agent is verified by a two 
level verification schemes. The authentication is verified at 
first level by a registration mechanism and the integrity of 
code is verified at second level by checksum method. This 
ensures that the mobile agent is not affected by other 
malicious mobile agent. Further, the itinerary is protected to 
ensure the secure transaction of data. Finally the data collected 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 19
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
is secured by using cryptographic methods to ensure the 
integrity of data. The proposed model protects the mobile 
agent from other malicious mobile agents in the platform. 
REFERENCES 
[1]. W. Jansen, "Countermeasures for mobile agent security", 
Computer Communication, Special issue on Advances in 
Research and Application of Network Security, November 
2000. 
[2]. Ibharalu F. T., Sofoluwe A.B., Akinwale A. T., "A 
reliable protection architecture for mobile agents in open 
network system", International journal of computer 
applications, Volume 17, Issue 7, pp.6-14, 2011. 
[3]. J.M.Gnanasekar and V. Ramachandran, "Distributed 
cryptographic key management for mobile agent security", 
International journal of recent trends in engineering, Volume 
I, Issue I, pp.164-167, 2009. 
[4]. Traig Mohammad Ahmed, "Using secure-image 
mechanism to protect mobile agent against malicious host", 
WASET, Volume 59,pp. 82-91,2009. 
[5]. Esfandi, A, Rahimabadi, AM., "Mobile agent security in 
multi agent environment using a multi agent multi key 
approach", Proceedings of 2nd IEEE International Conference 
on Computer Science and Information Technology, 
ICCSIT'09, pp. 438 - 442, 2009 
[6]. Shibli, M.A.; Muftic, S.; Giambruno, A; Lioy, A, 
"MagicNET Security system for development, validation and 
adoption of mobile agents", Proceedings of 3rd International 
Conference on Network and system security, pp.389-396, 
2009. 
[7]. S.M. Sarwarul Islam, Zinat S, Bo Sun, Md. Washiqul 
Islam, "Security of mobile agent in Ad Hoc network using 
threshold cryptography" ,WASET, Volume 70, pp.424-427, 
2010. 
[8]. Tarig Mohamed Ahmed, PhD, “Generate Sub-Agent 
Mechanism to Protect Mobile Agent Privacy”, 2012 IEEE 
Symposium on Computers and Informatics. 
[9]. M. Vigilson Prem and S. Swamynathan,”Securing Mobile 
Agent and its Platform from Passive Attack of Malicious 
Mobile Agents”, IEEE-International Conference on Advances 
In Engineering, Science And Management (ICAESM -2012) 
March 30, 31, 2012 
BIOGRAPHIES 
Asha Anil was born in Kerala India. She 
received B.Tech in Computer Science from 
College of Engineering Munnar in the year 
2007 and is currently pursuing M.Tech in 
Computer Science with Specialization in Data 
Security in Toc H Institute of Science and 
Technology. She has nearly 5 years of experience including 
industry and teaching .Her areas of interest include Data 
Security, Automata, Computer Graphics and her research 
interest includes Data and Network Security. 
Jesna Anver was born in Kerala, India. She 
receieved B.Tech from Model Engineering 
College, Thrikkakara in the year 2003 and 
M.Tech from Amrita University Coimbatore 
and is currently doing research in Cochin 
University of Science and Technology under the Dept of 
Electronics. She has nearly 10 years of teaching experience 
and is currently working as Associate Professor in Toc H 
Institute of Science and Technology under Computer Science 
Dept. Her areas of interest include Image Processing, Machine 
Learning Networking and Signal Processing 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 20

Más contenido relacionado

La actualidad más candente

The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...Konstantinos Demertzis
 
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSIJNSA Journal
 
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...ijtsrd
 
A Dashboard of ITS - Tableau de bord du STI
A Dashboard of ITS - Tableau de bord du STIA Dashboard of ITS - Tableau de bord du STI
A Dashboard of ITS - Tableau de bord du STIn allali
 
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...IJNSA Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011prasanna9
 
Cloud Forensics- An IS Approach
Cloud Forensics- An IS ApproachCloud Forensics- An IS Approach
Cloud Forensics- An IS ApproachIOSR Journals
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemesHabitamuAsimare
 
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)CSCJournals
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jainAnkita Jain
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19Francesco Flammini
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationPeter Choi
 
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
 
Intelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack DetectionsIntelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack DetectionsAM Publications,India
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET Journal
 
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesPattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesIJNSA Journal
 

La actualidad más candente (19)

The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
 
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
 
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
 
A Dashboard of ITS - Tableau de bord du STI
A Dashboard of ITS - Tableau de bord du STIA Dashboard of ITS - Tableau de bord du STI
A Dashboard of ITS - Tableau de bord du STI
 
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011ipas implicit password authentication system ieee 2011
ipas implicit password authentication system ieee 2011
 
Cloud Forensics- An IS Approach
Cloud Forensics- An IS ApproachCloud Forensics- An IS Approach
Cloud Forensics- An IS Approach
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemes
 
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jain
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
A0430104
A0430104A0430104
A0430104
 
Intelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack DetectionsIntelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack Detections
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
 
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesPattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
 

Destacado

Analysis and experimental investigation to mitigate
Analysis and experimental investigation to mitigateAnalysis and experimental investigation to mitigate
Analysis and experimental investigation to mitigateeSAT Publishing House
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
 
Influence of alkaline substances (carbonates and bicarbonates of sodium) in w...
Influence of alkaline substances (carbonates and bicarbonates of sodium) in w...Influence of alkaline substances (carbonates and bicarbonates of sodium) in w...
Influence of alkaline substances (carbonates and bicarbonates of sodium) in w...eSAT Publishing House
 
Modeling and optimization of end milling machining process
Modeling and optimization of end milling machining processModeling and optimization of end milling machining process
Modeling and optimization of end milling machining processeSAT Publishing House
 
The effect of watercement ratio on the sulfate
The effect of watercement ratio on the sulfateThe effect of watercement ratio on the sulfate
The effect of watercement ratio on the sulfateeSAT Publishing House
 
Video copy detection using segmentation method and
Video copy detection using segmentation method andVideo copy detection using segmentation method and
Video copy detection using segmentation method andeSAT Publishing House
 
Optimization and implementation of parallel squarer
Optimization and implementation of parallel squarerOptimization and implementation of parallel squarer
Optimization and implementation of parallel squarereSAT Publishing House
 
Sleep activated brake control & call assistance (sabcca)
Sleep activated brake control & call assistance (sabcca)Sleep activated brake control & call assistance (sabcca)
Sleep activated brake control & call assistance (sabcca)eSAT Publishing House
 
Performance analysis of cmos comparator and cntfet comparator design
Performance analysis of cmos comparator and cntfet comparator designPerformance analysis of cmos comparator and cntfet comparator design
Performance analysis of cmos comparator and cntfet comparator designeSAT Publishing House
 
Classification accuracy of sar images for various land
Classification accuracy of sar images for various landClassification accuracy of sar images for various land
Classification accuracy of sar images for various landeSAT Publishing House
 
Analysis on parameters affecting sleep apnea & control measures using low cos...
Analysis on parameters affecting sleep apnea & control measures using low cos...Analysis on parameters affecting sleep apnea & control measures using low cos...
Analysis on parameters affecting sleep apnea & control measures using low cos...eSAT Publishing House
 
Study and comparison of various communication based protective relaying schem...
Study and comparison of various communication based protective relaying schem...Study and comparison of various communication based protective relaying schem...
Study and comparison of various communication based protective relaying schem...eSAT Publishing House
 
Evaluation of performance of intake tower dam for
Evaluation of performance of intake tower dam forEvaluation of performance of intake tower dam for
Evaluation of performance of intake tower dam foreSAT Publishing House
 
Analysis of different types of current mirror in 45 nm
Analysis of different types of current mirror in 45 nmAnalysis of different types of current mirror in 45 nm
Analysis of different types of current mirror in 45 nmeSAT Publishing House
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletseSAT Publishing House
 
An evaluation of manet protocols in terms of tcp variants based on thier perf...
An evaluation of manet protocols in terms of tcp variants based on thier perf...An evaluation of manet protocols in terms of tcp variants based on thier perf...
An evaluation of manet protocols in terms of tcp variants based on thier perf...eSAT Publishing House
 
Misconduct disclosure of the intermediates using the trusted authority
Misconduct disclosure of the intermediates using the trusted authorityMisconduct disclosure of the intermediates using the trusted authority
Misconduct disclosure of the intermediates using the trusted authorityeSAT Publishing House
 

Destacado (20)

Analysis and experimental investigation to mitigate
Analysis and experimental investigation to mitigateAnalysis and experimental investigation to mitigate
Analysis and experimental investigation to mitigate
 
Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...Offline signature identification using high intensity variations and cross ov...
Offline signature identification using high intensity variations and cross ov...
 
Influence of alkaline substances (carbonates and bicarbonates of sodium) in w...
Influence of alkaline substances (carbonates and bicarbonates of sodium) in w...Influence of alkaline substances (carbonates and bicarbonates of sodium) in w...
Influence of alkaline substances (carbonates and bicarbonates of sodium) in w...
 
Modeling and optimization of end milling machining process
Modeling and optimization of end milling machining processModeling and optimization of end milling machining process
Modeling and optimization of end milling machining process
 
Enhancement of power quality in a
Enhancement of power quality in aEnhancement of power quality in a
Enhancement of power quality in a
 
The effect of watercement ratio on the sulfate
The effect of watercement ratio on the sulfateThe effect of watercement ratio on the sulfate
The effect of watercement ratio on the sulfate
 
Video copy detection using segmentation method and
Video copy detection using segmentation method andVideo copy detection using segmentation method and
Video copy detection using segmentation method and
 
Optimization and implementation of parallel squarer
Optimization and implementation of parallel squarerOptimization and implementation of parallel squarer
Optimization and implementation of parallel squarer
 
Sleep activated brake control & call assistance (sabcca)
Sleep activated brake control & call assistance (sabcca)Sleep activated brake control & call assistance (sabcca)
Sleep activated brake control & call assistance (sabcca)
 
Studies on stabilised adobe blocks
Studies on stabilised adobe blocksStudies on stabilised adobe blocks
Studies on stabilised adobe blocks
 
Performance analysis of cmos comparator and cntfet comparator design
Performance analysis of cmos comparator and cntfet comparator designPerformance analysis of cmos comparator and cntfet comparator design
Performance analysis of cmos comparator and cntfet comparator design
 
Classification accuracy of sar images for various land
Classification accuracy of sar images for various landClassification accuracy of sar images for various land
Classification accuracy of sar images for various land
 
Analysis on parameters affecting sleep apnea & control measures using low cos...
Analysis on parameters affecting sleep apnea & control measures using low cos...Analysis on parameters affecting sleep apnea & control measures using low cos...
Analysis on parameters affecting sleep apnea & control measures using low cos...
 
Study and comparison of various communication based protective relaying schem...
Study and comparison of various communication based protective relaying schem...Study and comparison of various communication based protective relaying schem...
Study and comparison of various communication based protective relaying schem...
 
Evaluation of performance of intake tower dam for
Evaluation of performance of intake tower dam forEvaluation of performance of intake tower dam for
Evaluation of performance of intake tower dam for
 
Analysis of different types of current mirror in 45 nm
Analysis of different types of current mirror in 45 nmAnalysis of different types of current mirror in 45 nm
Analysis of different types of current mirror in 45 nm
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded wavelets
 
An evaluation of manet protocols in terms of tcp variants based on thier perf...
An evaluation of manet protocols in terms of tcp variants based on thier perf...An evaluation of manet protocols in terms of tcp variants based on thier perf...
An evaluation of manet protocols in terms of tcp variants based on thier perf...
 
Environmental sciences
Environmental sciencesEnvironmental sciences
Environmental sciences
 
Misconduct disclosure of the intermediates using the trusted authority
Misconduct disclosure of the intermediates using the trusted authorityMisconduct disclosure of the intermediates using the trusted authority
Misconduct disclosure of the intermediates using the trusted authority
 

Similar a An enhanced approach for securing mobile agents from

Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...CSCJournals
 
Dashboard of intelligent transportation system (ITS) using mobile agents stra...
Dashboard of intelligent transportation system (ITS) using mobile agents stra...Dashboard of intelligent transportation system (ITS) using mobile agents stra...
Dashboard of intelligent transportation system (ITS) using mobile agents stra...IJECEIAES
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...IJNSA Journal
 
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSINTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSIJNSA Journal
 
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSINTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSIJNSA Journal
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
Internal security on an ids based on agents
Internal security on an ids based on agentsInternal security on an ids based on agents
Internal security on an ids based on agentscsandit
 
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSINTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTScscpconf
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docxRunning head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docxjeanettehully
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureeSAT Publishing House
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsA Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsCSCJournals
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IJNSA Journal
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
 

Similar a An enhanced approach for securing mobile agents from (20)

Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
 
P0704085089
P0704085089P0704085089
P0704085089
 
Dashboard of intelligent transportation system (ITS) using mobile agents stra...
Dashboard of intelligent transportation system (ITS) using mobile agents stra...Dashboard of intelligent transportation system (ITS) using mobile agents stra...
Dashboard of intelligent transportation system (ITS) using mobile agents stra...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
 
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSINTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
 
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSINTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Internal security on an ids based on agents
Internal security on an ids based on agentsInternal security on an ids based on agents
Internal security on an ids based on agents
 
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSINTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
A017360104
A017360104A017360104
A017360104
 
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docxRunning head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
Running head SECURING NATIVE APPLICATIONSSECURING NATIVE APPLIC.docx
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile AgentsA Performance Analysis of Chasing Intruders by Implementing Mobile Agents
A Performance Analysis of Chasing Intruders by Implementing Mobile Agents
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 

Más de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Más de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Último

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 

Último (20)

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 

An enhanced approach for securing mobile agents from

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 AN ENHANCED APPROACH FOR SECURING MOBILE AGENTS FROM THE ATTACK OF OTHER MALICIOUS MOBILE AGENTS Asha Anil1, Jesna Anver2 1PG Student, 2Associate Professor, Department of Computer Science and Engineering, Toc H Institute of Science and Technology, Kerala, India Abstract The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is beginning to move toward developing techniques that are oriented towards protecting the agent. Agent technology has been used in many critical applications like business process management, e-commerce, artificial intelligence, distributed processing etc. The mobile agent technology has encountered many security threats during the itinerary period .The security schemes presented in this paper for mobile agent address the code, data and itinerary security issues. An environment that protects the legitimate mobile agent from the malicious mobile agent is provided. A checksum method is used to detect a malicious mobile agent which is appending to a legitimate mobile agent. The confidentiality of the data that are retrieved from each remote server is ensured by encryption mechanisms. The itinerary is also protected by allowing only registered users to create new mobile agents and is controlled by a central co-coordinator. Thus an enhanced security mechanism is presented to protect the mobile agent’s code, data and route. Keywords: Mobile Agent, Security Threats, Central Co-ordinator, Checksum Method ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION A software agent is program that acts as a user’s personal assistant and is classified as static agents and mobile agents. Static agents execute on a single machine to achieve their goal Software agents which have the property of mobility are called mobile agents and they perform a user’s task by migrating and executing on several hosts connected to the network. Mobility increases the functionality of the mobile agent and allows the mobile agent to perform tasks beyond the scope of static agents. An agent is defined as “a person whose job is to act for, or manage the affairs of, other people. In the context of computers, software agents refer to programs that perform certain tasks on behalf of the user. Imagine that we want to go on a trip to a new holiday destination. We contact your travel agent program and describe our preferences and our constraints. The program suggests where we can spend our holidays after taking into consideration several information sources such as flight timings, guides and verifying the availability of tickets and hotel rooms etc. When we confirm our destination, the program books the flight tickets and reserves the hotel rooms for us. Thus the software agent acts as our personal assistant and they exhibit certain properties, such as: autonomy – they act without the need of constant human supervision, sociability – the ability to interact with other agents if necessary, reactivity – ability to react to changes in the environment, proactivity – taking initiative at needed times, in order to reach objectives. 2. RELATED WORKS The existing system provides mobile agent authentication at each host. This ensures that the mobile agent is dispatched by the intended sender only. But the integrity of the code is not guaranteed. Any receiver can confirm the identity of the sender but not the content of the code. There is a possibility of malicious mobile agent appending itself with the legitimate mobile agent without modifying or altering the contents of the code. The verifying process only verifies for sender's authentication and not the integrity of code. In overall there is a lack in available security system that provides security for itinerary details, data and particularly mobile agents' code. Also in the existing system, there is no mechanism for authentication checking and the agent verification is done through checking agent size. If the agent size exceeds a particular limit, kill that agent. But it may not be suitable in all cases. Over the years computer systems have evolved from centralized monolithic computing devices supporting static applications, into networked environments that allow complex forms of distributed computing. A new phase of evolution is now under way based on software agents. A software agent is loosely defined as a program that can exercise an individual’s or organization's authority, work autonomously toward a goal, and meet and interact with other agents. _______________________________________________________________________________________ Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 16
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 Wayne A. Jansen et al. [1] proposed a number of models exist for describing agent system, however, for discussing security issues it is sufficient to use a very simple one, consisting of only two main components: the agent and the agent platform and have summarized the various methods devised for protecting the agent platform such as Software-Based Fault Isolation, Safe Code Interpretation, Signed Code, State Appraisal, Proof Carrying Code etc and more general-purpose techniques for protecting an agents such as Host Revocation Authority, Execution Tracing ,Obfuscated Code, Ajanta System, Partial Result Encapsulation, Environment Key Generation etc. Ibharalu et.al [2] proposed reliable protection architecture using Travel Diary Protection Scheme and Platform Registry which allows and protects mobile agents to roam freely in open networks environment without being attacked by malicious hosts. The paper focuses on securing free-roaming agents in open network environments and presents a novel security protocol which has fine function in preventing attacks. J.M.Gnanasekar et.al [3] has proposed a number of solutions for securing data section in a mobile agent from discovery and exploitation by a malicious host are proposed based on cryptographic principles have their own limitations. The cryptographic key generation and distribution mechanism strongly holds the success of the mobile agent security systems. The agents and hosts are mutually distrusting each other, but they trust the third parties. In the paper [3], this property is exploited for the secure way of generating and distributing the keys using service oriented architecture. The major security future for mobile agent, the Publicly Verifiable and Forward Integrity (PVFI) and Forward Privacy (FP) are also ensured. Tarig Mohamed et.al in [4] has proposed a Secure-Image Mechanism (SIM) to protect mobile agents against malicious hosts. SIM aims to protect mobile agent by using the symmetric encryption and hash function in cryptography science. This mechanism can prevent the eavesdropping and alteration attacks. The main benefit of this mechanism is to allow the mobile agent to continue its journey without problem in case these types of attacks occurred. The paper [4] presents some solution proposed by research in the area of the mobile agent protection and explains the symmetric encryption and hash function concept. Abolfazl esfandi et.al in [5] has proposed a mobile agent security in multi agent environments using a multi agent-multi key approach .In paper [5] they consider the problem of keeping sensitive data and algorithms contained in a mobile agent from discovery and exploitation by a malicious host. They illustrate a novel distributed protocol for multi agent environments to improve the communication security in packet switched networks. To enrich the overall system security the approach makes use of distribution and double encryption and some other traditional methods such as digital signature. In this approach the encrypted private key and the message are broken into different parts carrying by different agents which makes it difficult for malicious entities to mine the private key for message encryption, while the private key for the encrypted key is allocated on the predetermined destination nodes. On the other hand, all of the previously proposed encryption algorithms can be applied in their proposed approach that deteriorates the key discovery process. To improve the overall security, the paper makes use of Advanced Encryption Standard (AES) as the encryption base for message encryption. The paper also presents some evaluation discussions presenting time overhead analysis and crack probability. Muhammad Awais Shibli et.al [6] has proposed MAGICNET: security system for development, validation and adoption of mobile agents .The research in the area of mobile agents’ security mainly deals with protection and security for agents and agents’ runtime platforms. Sarwarul et.al [7] has proposed a mechanism for security of mobile agent in ad hoc network using threshold cryptography .One of the main advantages of using Mobile Agent in a network is it reduces network traffic load. In an ad hoc network Mobile Agent can be used to protect the network by using agent based IDS .Tarig mohamed et .al [8] has proposed a sub-agent mechanism to protect mobile agent privacy this paper a new mechanism called Generated Sub-Agent Mechanism (GSAM) to protect mobile agent against malicious Hosts The main idea behind GSMA is to generate a sub-mobile agent from the mobile agent in case the mobile agent will visit an untrusted host. The sub-mobile agent visits the untrusted host instead of the mobile agent. M. Vigilson Prem et.al [9] has proposed agent sizing method to prevent the entry of a malicious mobile agent. . But it is not suitable for most of the cases as a malicious agent with the same size may get attached to the legitimate mobile agent. 3. EXISTING SYSTEM In the existing system, verification was done with the help of agent sizing. If the size of mobile along with the data is larger than the critical section buffer, it is expelled out of the system. The mobile agent was kept in 'deactivated' state while this check is performed. This restricts the mobile agent not to perform any malicious action inside the host and thus protects the host platform from malicious activities of mobile agent. In case, the mobile agent fails this test, it is killed immediately inside the critical section itself. Further, at this stage only, the append entry attack is detected. If there is an increase in size of the agent against the size fixed at the sender's side, illegal entry of mobile code is detected. On detecting this attack, the mobile agent is destroyed immediately based on malicious reasons. Otherwise the _______________________________________________________________________________________ Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 17
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 mobile agent is allowed to execute in its execution environment.ie, here agent verification is done through checking agent size. If the agent size exceeds a particular limit, kill that agent. But it is not suitable for most of the cases as an malicious agent with the same size may get attached to the legitimate mobile agent either by deleting some parts of it or by replacing the agent. 4. PROPOSED SYSTEM Our proposed system provides an environment that protects the legitimate mobile agent from the malicious mobile agent. The general architecture of the system for an information retrieval application with fault tolerant and security model is shown in figure 1. Web service is requested to plan and select dynamically, the next host to visit, based on parameters like size of data, aliveness, bandwidth. The authorized user submits his request, for example, an information retrieval request, to the mobile agent system. The agent creator creates the agent and the agent verification, data verification and path management are done by web service module. If verified, the data collection or actions if any are performed and the agent migrates to the next host and reaches back to the end user On arrival at each host, the mobile agent undergoes security check and on success the mobile agent is allowed to execute in the environment. Fig -1: Overall architecture of the proposed system 4.1 Authentication Checking The modified system proceeds using following steps a. Creating Mobile Agents: - only registered users can create mobile agents b. Agent Registration: - After creating mobile agents, mobile agents are registered to central mobile coordinator. During registration phase, creator send agent checksum, agent name, migration path are sent to this coordinator c. Modify Mobile Agent Running platform :- In existing system, running environment checking agent size only for verification. But in our new environment, after receiving a mobile agent, the running environment sent its checksum and agent code to central coordinator. Central coordinator checks its integrity and status code to running environment. If this is a success, then running environment start mobile agent otherwise kills that agent 4.2 Checksum Method The agent creator creates a mobile agent, and find its corresponding checksum and send the checksum to the central coordinator. It also sends the new path to the central coordinator if any new path change is found. The agent observer is a server that is distributed over different regions and its function is to monitor the movement of mobile agent in its corresponding region. It also acts as a service provider that services the requests related to those mobile agents. The agents generated at each host must be registered with agent observer and only the registered mobile agents are allowed to access the critical section. On successful completion of the task, the mobile agent is dispatched to next host after finding the proper host to migrate. Following are the main steps of Agent Observer a. Create an agent Observer b. Receive messages from mobile agents After the agent observer check authentication of request and sender agent, it returns data corresponding to agent request 4.3 Data Collection and Protection The data collected from one server must be secure and should not be known to others. To implement this constraint, every server will encrypt its data using the owner's public key. The owner's public key is obtained by decrypting the segment received from previous server using receiver's private key and each data packet is encrypted using owner's public key. At the same time, the data packet can be decrypted only by the owner and these packets can only be opened in the correct order, since the symmetric key used to decrypt an envelope is protected inside the previous packet The data packet received by any receiver is encrypted using owner's public key .On successful completion of task, the mobile agent appends the result with this packet and the new look packet is encrypted again using owner's public key Also a checksum is also calculated for the data to provide additional security so that upon receiving the node where the data is collected it can check the integrity of the data by this new method 4.4 Path Migration The web service is the central coordinator who keeps track of the path changes and holds the value of checksum of mobile agent.The details about the next host to be visited is controlled _______________________________________________________________________________________ Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 18
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 by the web service. Also the web service keeps track of the path modification if any in a dynamic itinerary 5. WORKING OF THE PROPOSED MODEL The entire working of our system with data and Agent verification is illustrated by a block diagram in Fig 2. The entire working of our system with data and Agent verification is illustrated by a block diagram in Fig 2.The figure describes how an agent is created, verified, and migrated. The agent is verified by a checksum mechanism and the data collected is also secured by a series of encryption mechanisms. Also the next path to be taken is obtained from the web server or the central coordinator and ultimately reaches the end user. Fig -2: Block Diagram of the entire system 5.1 Algorithm Step 1: Create a mobile agent by a registered user. Step 2: Register the mobile agents with the web server. Step 3: Verify the authenticity of agent with the help of checksum method Step 4: Perform the operation required or collect the data from the intermediate hosts and encrypt the data by any encryption mechanism Step 5: Verify the data collected. Step 6: Obtain the next path from the central coordinator and choose the next host to be visited. Step 7: Perform Agent Migration Step 8: Stop 6. CONCLUSIONS The area of mobile agent security is in a state of immaturity, but rapidly improving. The traditional orientation toward host-based security persists and, therefore, available protection mechanisms tend to focus on protecting the agent platform. Emphasis is beginning to move toward developing techniques that are oriented toward protecting the agent, a much more difficult problem. There are a number of agent-based application domains for which basic and conventional security techniques should prove adequate mobile agent technology is intriguing and offers a new paradigm for application development Agent technology has been used in many critical applications such as personal information management, electronic commerce, business process management, artificial intelligence, interface design, distributed processing and distributed algorithms. Besides its bright side, the technology has encountered many security threats. These problems are faced during the itinerary period of an agent traversing from platform to platform in the network. The unexpected failure or change in network components or status makes the static planning not a best option and makes the mobile agent users to opt for dynamic itinerary. But the problem is that the itinerary details are open to all hosts. But for secure transaction applications, the itinerary details must not be known to any other hosts in the network The data collected from each host must be protected from any other host .Only the owner of the agent is allowed to decrypt the encrypted data at each host. More importantly, the existing provides mobile agent authentication at each host. This ensures that the mobile agent is dispatched by the intended sender only. But the integrity of the code is not guaranteed. Any receiver can confirm the identity of the sender but not the content of the code. There is a possibility of malicious mobile agent appending itself with the legitimate mobile agent without modifying or altering the contents of the code. The verifying process only verifies for sender's authentication and not the integrity of code. In overall there is a lack in available security system that provides security for itinerary details, data and particularly mobile agents' code. This situation has given the motivation to present a three dimensional security model that protects mobile agent from malicious agents' passive attack, data and itinerary details from executing hosts In our proposed system we are providing security for agent’s code, data as well as path through a series of encryption mechanism. The code of the mobile agent is verified by a two level verification schemes. The authentication is verified at first level by a registration mechanism and the integrity of code is verified at second level by checksum method. This ensures that the mobile agent is not affected by other malicious mobile agent. Further, the itinerary is protected to ensure the secure transaction of data. Finally the data collected _______________________________________________________________________________________ Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 19
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 is secured by using cryptographic methods to ensure the integrity of data. The proposed model protects the mobile agent from other malicious mobile agents in the platform. REFERENCES [1]. W. Jansen, "Countermeasures for mobile agent security", Computer Communication, Special issue on Advances in Research and Application of Network Security, November 2000. [2]. Ibharalu F. T., Sofoluwe A.B., Akinwale A. T., "A reliable protection architecture for mobile agents in open network system", International journal of computer applications, Volume 17, Issue 7, pp.6-14, 2011. [3]. J.M.Gnanasekar and V. Ramachandran, "Distributed cryptographic key management for mobile agent security", International journal of recent trends in engineering, Volume I, Issue I, pp.164-167, 2009. [4]. Traig Mohammad Ahmed, "Using secure-image mechanism to protect mobile agent against malicious host", WASET, Volume 59,pp. 82-91,2009. [5]. Esfandi, A, Rahimabadi, AM., "Mobile agent security in multi agent environment using a multi agent multi key approach", Proceedings of 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT'09, pp. 438 - 442, 2009 [6]. Shibli, M.A.; Muftic, S.; Giambruno, A; Lioy, A, "MagicNET Security system for development, validation and adoption of mobile agents", Proceedings of 3rd International Conference on Network and system security, pp.389-396, 2009. [7]. S.M. Sarwarul Islam, Zinat S, Bo Sun, Md. Washiqul Islam, "Security of mobile agent in Ad Hoc network using threshold cryptography" ,WASET, Volume 70, pp.424-427, 2010. [8]. Tarig Mohamed Ahmed, PhD, “Generate Sub-Agent Mechanism to Protect Mobile Agent Privacy”, 2012 IEEE Symposium on Computers and Informatics. [9]. M. Vigilson Prem and S. Swamynathan,”Securing Mobile Agent and its Platform from Passive Attack of Malicious Mobile Agents”, IEEE-International Conference on Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012 BIOGRAPHIES Asha Anil was born in Kerala India. She received B.Tech in Computer Science from College of Engineering Munnar in the year 2007 and is currently pursuing M.Tech in Computer Science with Specialization in Data Security in Toc H Institute of Science and Technology. She has nearly 5 years of experience including industry and teaching .Her areas of interest include Data Security, Automata, Computer Graphics and her research interest includes Data and Network Security. Jesna Anver was born in Kerala, India. She receieved B.Tech from Model Engineering College, Thrikkakara in the year 2003 and M.Tech from Amrita University Coimbatore and is currently doing research in Cochin University of Science and Technology under the Dept of Electronics. She has nearly 10 years of teaching experience and is currently working as Associate Professor in Toc H Institute of Science and Technology under Computer Science Dept. Her areas of interest include Image Processing, Machine Learning Networking and Signal Processing _______________________________________________________________________________________ Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 20