Efficient software-based fault isolation
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Maté: a tiny virtual machine for sensor networks
Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
Mobile Agent Security and Telescript
COMPCON '96 Proceedings of the 41st IEEE International Computer Conference
Java Bytecode Verification: Algorithms and Formalizations
Journal of Automated Reasoning
Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
Design and implementation of a framework for efficient and programmable sensor networks
Proceedings of the 1st international conference on Mobile systems, applications and services
MILA – multilevel immune learning algorithm and its application to anomaly detection
Soft Computing - A Fusion of Foundations, Methodologies and Applications
A Test Suite for the Evaluation of Mobile Agent Platform Security
IAT '06 Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology
Towards a mobile agent framework for sensor networks
EmNets '05 Proceedings of the 2nd IEEE workshop on Embedded Networked Sensors
ICETET '08 Proceedings of the 2008 First International Conference on Emerging Trends in Engineering and Technology
Network fault detection with Wiener filter-based agent
Journal of Network and Computer Applications
A new reverse auction agent system for m-commerce using mobile agents
Computer Standards & Interfaces
Performance analysis of mobile agent failure recovery in e-service applications
Computer Standards & Interfaces
Agent-based artificial immune system approach for adaptive damage detection in monitoring networks
Journal of Network and Computer Applications
Advanced mobile agent security models for code integrity and malicious availability check
Journal of Network and Computer Applications
Immunocomputing for intelligent intrusion detection
IEEE Computational Intelligence Magazine
An artificial immune system architecture for computer securityapplications
IEEE Transactions on Evolutionary Computation
IEEE Transactions on Neural Networks
Hi-index | 0.00 |
An emerging technology for systems to communicate efficiently in the distributed environment is the mobile agent. The features of the mobile agent are too big when compared with the static agent and conventional communication system. However, the security issues of the mobile agent and mobile agent platform lags its usage. Even though the protection models are available for the mobile agent environment, the vulnerabilities still exist or the models need more computational time. To mitigate these issues related with the agent platform, this paper proposed an artificial immune system (AIS) based model. The proposed model will give the separation of duties and clones to handle multiple foreign agents simultaneously to achieve the computational efficiency. The experimental results and the constructed results from the experimental results have proved that this proposed model will consume less computational time when compared with the existing models. It will detect the malicious agent by extracting and matching the patterns with the available malicious patterns and also it can identify the new malicious patterns through monitoring the agent process.