Seven good reasons for mobile agents
Communications of the ACM
Security Requirements Engineering: A Framework for Representation and Analysis
IEEE Transactions on Software Engineering
A Multi-agent Security Architecture
NSS '09 Proceedings of the 2009 Third International Conference on Network and System Security
Uncertainty in the weakest-link security game
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Security and performance in service-oriented applications: Trading off competing objectives
Decision Support Systems
Proceedings of the 2010 workshop on New security paradigms
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Hi-index | 0.00 |
This paper proposes an architecture that can support autonomous mobile agents performing intrusion prevention activities on a heterogeneous network. The division of duties performed by the agents in the system ensures the agents are able to remain distributed throughout the network architecture to eliminate single points of failure. The distributed nature of the architecture reduces the workload on network clients and eliminates duplication of effort wherever possible. The use of virtual machine interfaces between the hardware and the network connection isolates the hardware interface in order to maintain trust and integrity of the connection and reduce the potential for an attacker using a trusted resource to damage network assets. Virtual machine connections allow a potential malware infection that invades the network environment to be safely observed for unusual behavior patterns using heuristic analysis to provide new evidentiary indicators that can be used to identify the malware during future outbreaks.