Nothing Special   »   [go: up one dir, main page]

Skip to main content

A Method for Protecting Mobile Agents against Denial of Service Attacks

  • Conference paper
  • First Online:
Cooperative Information Agents VI (CIA 2002)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2446))

Included in the following conference series:

Abstract

In the world of mobile agents, security aspects are extensively being discussed. In this context, denial of service attacks are of considerable interest. Here, we consider a special kind of denial of service attacks which focuses on malicious hosts that either delete received agents or prevent them from continuing their route. In general, the prevention of such attacks is not possible. This paper discusses a detection method for a posteriori identification of such malicious hosts. The output of this identification method can be used by agent owners to avoid contacting these hosts again in the future. Moreover, hosts originally intended to be visited cannot be skipped as a result of one malicious host’s misbehavior. We provide solutions to this problem for both the cases of completely dependent and completely independent agent computations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Antonio Corradi, Marco Cremonini, Rebecca Montanari, and Cesare Stefanelli. Mobile agents integrity for electronic commerce applications. Information Systems, 24(6), 1999.

    Google Scholar 

  2. Stefan Dobrev, Paola Flocchini, Guiseppe Prencipe, and Nicola Santoro. Mobile search for a black hole in an anonymous ring. In Distributed Computing (DISC 2001), 15th International Conference, Proceedings, number 2180 in LNCS. Springer Verlag, 2001.

    Google Scholar 

  3. Dong Chun Lee and Jeom Goo Kim. Adaptive migration strategy for mobile agents on internet. In Technologies for E-Services (TES 2001), Second International Workshop, Proceedings, number 2193 in LNCS. Springer Verlag, 2001.

    Google Scholar 

  4. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. CRC Press series on discrete mathematics and its applications. CRC Press, 1997. ISBN 0-8493-8523-7.

    Google Scholar 

  5. Tomas Sander and Christian F. Tschudin. Protecting mobile agents against malicious hosts. In G. Vigna, editor, Mobile Agents and Security, number 1419 in LNCS. Springer Verlag, 1998.

    Chapter  Google Scholar 

  6. Fred B. Schneider. Towards fault-tolerant and secure agentry. In Distributed Algorithms, 11th International Workshop (WDAG’97), Proceedings, number 1320 in LNCS. Springer Verlag, 1997.

    Google Scholar 

  7. Giovanni Vigna. Cryptographic traces for mobile agents. In G. Vigna, editor, Mobile Agents and Security, number 1419 in LNCS. Springer Verlag, 1998.

    Google Scholar 

  8. Dirk Westhoff, Markus Schneider, Claus Unger, and Firoz Kaderali. Methods for protecting a mobile agent’s route. In Information Security, Second International Workshop (ISW’99), number 1729 in LNCS. Springer Verlag, 1999.

    Google Scholar 

  9. Dirk Westhoff, Markus Schneider, Claus Unger, and Firoz Kaderali. Protecting a mobile agent’s route against collusions. In Selected Areas in Cryptography, 6th Annual International Workshop (SAC’99), number 1758 in LNCS. Springer Verlag, 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cubaleska, B., Schneider, M. (2002). A Method for Protecting Mobile Agents against Denial of Service Attacks. In: Klusch, M., Ossowski, S., Shehory, O. (eds) Cooperative Information Agents VI. CIA 2002. Lecture Notes in Computer Science(), vol 2446. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45741-0_26

Download citation

  • DOI: https://doi.org/10.1007/3-540-45741-0_26

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44173-1

  • Online ISBN: 978-3-540-45741-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics