An Enhancement of the Random Sequence 3-Level Obfuscated Algorithm for Protecting Agents Against Malicious Hosts
Keywords:
Agent security, Malicious host, Spying attack, Noise codeAbstract
With the advent of agent technology, the need for security of applications becomes a concern that is beyond classical data security capability and considerations. Without proper security protection especially against a malicious host attack, the widespread use of agent technology can be severely impeded. The Random Sequence 3-level obfuscated algorithm has been proposed by the authors to improve agent security: in this paper, an enhancement to the protection level of this algorithm is proposed. The effectiveness of the obfuscation algorithm is enhanced by addition of noise, which surrounds the true value carried by the agent with false values. A malicious host can thus at best guess the true value carried by the agent.References
Abu Bakar, K. and Doherty, B. S.: A Random Sequence 3-level Obfuscated Algorithm for Protecting Mobile Agents Against Malicious Hosts. Proceedings of the 2003 International Conference on Informatics, Cybernetics and Systems. I-Shou University(2003) 525 - 530
DiVincenzo, D. P., Leung, D. W. and Terhal, B. M.: Quantum Data Hiding. IEEE Transactions on Information Theory, Vol. 48, No. 3. IEEE(2002) 580-598 http://dx.doi.org/10.1109/18.985948
Farmer, W.M. and Guttman, J.D. and Swarup, V.: Security for Mobile Agents: Issues and Requirements. Proceedings of the 19th National Information System Security Conference. Baltimore (1996) 591-597
Harmsen, J. J. and Pearlman, W. A.: Steganalysis of Additive Noise Modelable Information Hiding. Proceedings of SPIE Electronic Imaging 5022. SPIE (2003) 21-24
Hohl, F.: A Framework to Protect Mobile Agents by Using Reference States. In: Proceedings of the 20th international conference on distributed computing systems (ICDCS 2000). IEEE Computer Society (2000) 410-417 http://dx.doi.org/10.1109/icdcs.2000.840953
Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts. In: G. Vigna (Ed.). Mobile Agent and Security. Lecture Notes in Computer Science, Vol. 1419. Springer- Verlag, Berlin(1998) 92-113 http://dx.doi.org/10.1007/3-540-68671-1_6
Sun Microsystems, Inc. Java 2 Platform Std. Ed. V1.3.1 http://java.sun.com/j2se/ 1.3/docs/api/index. html (2004)
Mandry, T., Pernul, G. and Rohm, A.: Mobile Agents in Electronic Markets: Opportunities, Risks, Agent Protection. International Journal of Electronic Commerce. M.E. Sharpe (2001) 47-60
Ng, S. K. and Cheung, K. W.: Protecting Mobile Agents against Malicious Hosts by Intention Spreading. In H. Arabnia (ed.), Proc. International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'99). CSREA (1999) 725-729
Ng, S. K. and Cheung, K. W.: Intention Spreading: An extensible theme to protect mobile agents from read attack hoisted by malicious hosts. In Jimming Liu, Ning Zhong(ed.), Intelligent Agent Technology: Systems, Methodologies and Tools. World Scientific (1999) 406-415
Sander, T. and Tschudin, C.: Protecting Mobile Agent Against Malicious Hosts. In: G. Vigna (Ed.). Mobile Agent and Security. Lecture Notes in Computer Science, Vol. 1419. Springer-Verlag, Berlin(1998) 44-60 http://dx.doi.org/10.1007/3-540-68671-1_4
Yeh,W. H. and Hwang, J. J.: Hiding Digital Information Using a Novel System Scheme. Computers and Security, Vol. 20, No. 6. Elsevier Science (2001) 533-538
Published
Issue
Section
License
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.