A security framework for mobile agent systems

被引:0
作者
Donies Samet
Farah Barika Ktata
Khaled Ghedira
机构
[1] University of la Manouba,National School of Computer Sciences (ENSI)
[2] Higher Institute of Applied Sciences and Technology of Sousse,undefined
[3] Université Centrale de Tunis,undefined
[4] Honoris United Universities,undefined
来源
Automated Software Engineering | 2024年 / 31卷
关键词
Mobile agent system; Security; MA-UML profile; Cooperative attacks;
D O I
暂无
中图分类号
学科分类号
摘要
Security is a very important challenge in mobile agent systems due to the strong dependence of agents on the platform and vice versa. According to recent studies, most current mobile agent platforms suffer from significant limitations in terms of security when they face Denial of Service (DOS) attacks. Current security solutions even provided by the mobile agent platforms or by the literature focus essentially on individual attacks and are mainly based on static models that present a lack of the permissions definition and are not detailed enough to face collaborative DOS attacks executed by multiple agents or users. This paper presents a security framework that adds security defenses to mobile agent platforms. The proposed security framework implements a standard security model described using MA-UML (Mobile Agent-Unified Modeling Language) notations. The framework lets the administrator (of agents’ place) define a precise and fine-grained authorization policy to defend against DOS attacks. The authorization enforcement in the proposed framework is dynamic : the authorization decisions executed by the proposed framework are based upon run-time parameters like the amount of activity of an agent. We implement an experiment on a mobile agent system of e-marketplaces. Given that we focus essentially on the availability criterion, the performance of the proposed framework on a place is evaluated against DOS and DDOS attacks and investigated in terms of duration of execution that is the availability of the place.
引用
收藏
相关论文
共 71 条
  • [1] Alami-Kamouri S(2020)Mobile agent security based on cryptographic trace and SOS agent mechanisms J. Commun. 15 221-230
  • [2] Moukafih N(2020)Dummy-based approach for protecting mobile agents against malicious destination machines IEEE Access 8 129320-129337
  • [3] Orhanou G(2017)A biological immune system (bis) inspired mobile agent platform (map) security architecture Expert Syst. Appl. 72 269-282
  • [4] Elhajji S(2016)Mobile agent-based software systems modeling approaches: a comparative study J. Comput. Inf. Technol. 24 149-163
  • [5] Alluhaybi B(2008)Jade A software framework for developing multi-agent applications lessons learned Inf. Softw. Technol. 50 10-21
  • [6] Alrahhal MS(2009)A security-aware metamodel for multi-agent systems (mas) Inf. Softw. Technol. 51 832-845
  • [7] Alzahrani A(2014)Intelligent software agent technology: an overview Int. J. Comput. Appl. 89 19-31
  • [8] Thayananthan V(2009)Evaluating the security of mobile agent platforms Auton. Agent. Multi-Agent Syst. 18 295-311
  • [9] Bagga P(2006)Path-history-based access control for mobile agents Int. J. Parallel, Emerg. Distrib. Syst. 21 215-225
  • [10] Hans R(2009)Ma-uml: a conceptual approach for mobile agents’ modelling Int. J. Agent-Oriented Softw. Eng. 3 277-305