Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Profile-Based security against malicious mobile agents
ADMA'06 Proceedings of the Second international conference on Advanced Data Mining and Applications
Hi-index | 0.00 |
Mobile agents are easy to be attacked. Although traditional security methods (authentication, encryption, etc.) can protect them from certain kinds of attacks, mobile agent can still be exploited for illegal purpose. In our approach, we propose an anomaly detection model for detecting malicious agents. We analyze mobile agent's activity by measuring its movement pattern and residence time on hosts in this preliminary approach. We classify the normal agent tracks and predict the next agent's hop. We do experiments to test the prediction algorithm and analyze the results. Further on, our research will focus on detecting abnormal execution of agent's code.