An Enhancement of the Random Sequence 3-Level Obfuscated Algorithm for Protecting Agents Against Malicious Hosts

Authors

  • Kamalrulnizam Abu Bakar Faculty of Computer Science and Information System Universiti Teknologi Malaysia 81310 UTM Skudai Johor D. T. Malaysia
  • Bernard S. Doherty School of Engineering and Applied Science Aston University Aston Triangle, Birmingham B4 7ET United Kingdom

Keywords:

Agent security, Malicious host, Spying attack, Noise code

Abstract

With the advent of agent technology, the need for security of applications becomes a concern that is beyond classical data security capability and considerations. Without proper security protection especially against a malicious host attack, the widespread use of agent technology can be severely impeded. The Random Sequence 3-level obfuscated algorithm has been proposed by the authors to improve agent security: in this paper, an enhancement to the protection level of this algorithm is proposed. The effectiveness of the obfuscation algorithm is enhanced by addition of noise, which surrounds the true value carried by the agent with false values. A malicious host can thus at best guess the true value carried by the agent.

References

Abu Bakar, K. and Doherty, B. S.: A Random Sequence 3-level Obfuscated Algorithm for Protecting Mobile Agents Against Malicious Hosts. Proceedings of the 2003 International Conference on Informatics, Cybernetics and Systems. I-Shou University(2003) 525 - 530

DiVincenzo, D. P., Leung, D. W. and Terhal, B. M.: Quantum Data Hiding. IEEE Transactions on Information Theory, Vol. 48, No. 3. IEEE(2002) 580-598 http://dx.doi.org/10.1109/18.985948

Farmer, W.M. and Guttman, J.D. and Swarup, V.: Security for Mobile Agents: Issues and Requirements. Proceedings of the 19th National Information System Security Conference. Baltimore (1996) 591-597

Harmsen, J. J. and Pearlman, W. A.: Steganalysis of Additive Noise Modelable Information Hiding. Proceedings of SPIE Electronic Imaging 5022. SPIE (2003) 21-24

Hohl, F.: A Framework to Protect Mobile Agents by Using Reference States. In: Proceedings of the 20th international conference on distributed computing systems (ICDCS 2000). IEEE Computer Society (2000) 410-417 http://dx.doi.org/10.1109/icdcs.2000.840953

Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts. In: G. Vigna (Ed.). Mobile Agent and Security. Lecture Notes in Computer Science, Vol. 1419. Springer- Verlag, Berlin(1998) 92-113 http://dx.doi.org/10.1007/3-540-68671-1_6

Sun Microsystems, Inc. Java 2 Platform Std. Ed. V1.3.1 http://java.sun.com/j2se/ 1.3/docs/api/index. html (2004)

Mandry, T., Pernul, G. and Rohm, A.: Mobile Agents in Electronic Markets: Opportunities, Risks, Agent Protection. International Journal of Electronic Commerce. M.E. Sharpe (2001) 47-60

Ng, S. K. and Cheung, K. W.: Protecting Mobile Agents against Malicious Hosts by Intention Spreading. In H. Arabnia (ed.), Proc. International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'99). CSREA (1999) 725-729

Ng, S. K. and Cheung, K. W.: Intention Spreading: An extensible theme to protect mobile agents from read attack hoisted by malicious hosts. In Jimming Liu, Ning Zhong(ed.), Intelligent Agent Technology: Systems, Methodologies and Tools. World Scientific (1999) 406-415

Sander, T. and Tschudin, C.: Protecting Mobile Agent Against Malicious Hosts. In: G. Vigna (Ed.). Mobile Agent and Security. Lecture Notes in Computer Science, Vol. 1419. Springer-Verlag, Berlin(1998) 44-60 http://dx.doi.org/10.1007/3-540-68671-1_4

Yeh,W. H. and Hwang, J. J.: Hiding Digital Information Using a Novel System Scheme. Computers and Security, Vol. 20, No. 6. Elsevier Science (2001) 533-538

Published

2007-04-01

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.