Certificates for mobile code security
Proceedings of the 2002 ACM symposium on Applied computing
Detecting anomalous agents in mobile agent system: a preliminary approach
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2
Mobile-Agent versus Client/Server Performance: Scalability in an Information-Retrieval Task
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Learning trees and rules with set-valued features
AAAI'96 Proceedings of the thirteenth national conference on Artificial intelligence - Volume 1
A sense of self for Unix processes
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Countermeasures for mobile agent security
Computer Communications
Hi-index | 0.00 |
In this paper we describe a security system against malicious agents in a wireless ad hoc network. This system monitors the activities of mobile agents. By mining the log data, the system builds dynamic behavioral profiles for each class of agents. The profiles are then used to classify each agent instance and detect anomalous agents. The malicious nature of identified anomalous agents are further determined by a threat assessment module. For mobile agent profiling, we presented two approaches: one based on rule-learning and another on histograms of features related each agent class. We have implemented a prototype system using the histogram-based approach. The prototype is also described in the paper.