Abstract
In the world of mobile agents, security aspects are extensively being discussed. In this context, denial of service attacks are of considerable interest. Here, we consider a special kind of denial of service attacks which focuses on malicious hosts that either delete received agents or prevent them from continuing their route. In general, the prevention of such attacks is not possible. This paper discusses a detection method for a posteriori identification of such malicious hosts. The output of this identification method can be used by agent owners to avoid contacting these hosts again in the future. Moreover, hosts originally intended to be visited cannot be skipped as a result of one malicious host’s misbehavior. We provide solutions to this problem for both the cases of completely dependent and completely independent agent computations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Antonio Corradi, Marco Cremonini, Rebecca Montanari, and Cesare Stefanelli. Mobile agents integrity for electronic commerce applications. Information Systems, 24(6), 1999.
Stefan Dobrev, Paola Flocchini, Guiseppe Prencipe, and Nicola Santoro. Mobile search for a black hole in an anonymous ring. In Distributed Computing (DISC 2001), 15th International Conference, Proceedings, number 2180 in LNCS. Springer Verlag, 2001.
Dong Chun Lee and Jeom Goo Kim. Adaptive migration strategy for mobile agents on internet. In Technologies for E-Services (TES 2001), Second International Workshop, Proceedings, number 2193 in LNCS. Springer Verlag, 2001.
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. CRC Press series on discrete mathematics and its applications. CRC Press, 1997. ISBN 0-8493-8523-7.
Tomas Sander and Christian F. Tschudin. Protecting mobile agents against malicious hosts. In G. Vigna, editor, Mobile Agents and Security, number 1419 in LNCS. Springer Verlag, 1998.
Fred B. Schneider. Towards fault-tolerant and secure agentry. In Distributed Algorithms, 11th International Workshop (WDAG’97), Proceedings, number 1320 in LNCS. Springer Verlag, 1997.
Giovanni Vigna. Cryptographic traces for mobile agents. In G. Vigna, editor, Mobile Agents and Security, number 1419 in LNCS. Springer Verlag, 1998.
Dirk Westhoff, Markus Schneider, Claus Unger, and Firoz Kaderali. Methods for protecting a mobile agent’s route. In Information Security, Second International Workshop (ISW’99), number 1729 in LNCS. Springer Verlag, 1999.
Dirk Westhoff, Markus Schneider, Claus Unger, and Firoz Kaderali. Protecting a mobile agent’s route against collusions. In Selected Areas in Cryptography, 6th Annual International Workshop (SAC’99), number 1758 in LNCS. Springer Verlag, 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cubaleska, B., Schneider, M. (2002). A Method for Protecting Mobile Agents against Denial of Service Attacks. In: Klusch, M., Ossowski, S., Shehory, O. (eds) Cooperative Information Agents VI. CIA 2002. Lecture Notes in Computer Science(), vol 2446. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45741-0_26
Download citation
DOI: https://doi.org/10.1007/3-540-45741-0_26
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44173-1
Online ISBN: 978-3-540-45741-1
eBook Packages: Springer Book Archive