IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
An Architecture for Intrusion Detection Using Autonomous Agents
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Sandmark--A Tool for Software Protection Research
IEEE Security and Privacy
Obfuscation of executable code to improve resistance to static disassembly
Proceedings of the 10th ACM conference on Computer and communications security
Cooperative Itinerant Agents (CIA): Security Scheme for Intrusion Detection Systems
ICISP '06 Proceedings of the International Conference on Internet Surveillance and Protection
Zero-knowledge proofs of knowledge without interaction
SFCS '92 Proceedings of the 33rd Annual Symposium on Foundations of Computer Science
Self-validating branch-based software watermarking
IH'05 Proceedings of the 7th international conference on Information Hiding
Intrusion detection with mobile agents
Computer Communications
Hi-index | 0.00 |
In an agent's environment, the most difficult problem to solve is the attack from a platform against the agents. The use of software watermarking techniques is a possible solution to guarantee that the agents are properly executed. In this paper we propose these techniques in an Intrusion Detection System (IDS) based on agents. To achieve this goal, we propose to embed a matrix of marks in each transceiver of the IDS. Moreover, we include obfuscation techniques to difficult a possible code analysis by an unauthorized entity.