期刊文献+

基于间隔检测和信誉度的移动Agent安全机制 被引量:1

USING ALTERNATE DETECTION AND REPUTATION FOR MOBILE AGENT SECURITY
下载PDF
导出
摘要 移动代理技术是一种新型的分布式网络计算技术,得到广泛的研究。其中的安全性问题,特别是移动代理遭受恶意主机攻击的问题制约了移动代理技术的广泛应用。人们提出了基于参考状态的思想,但目前提出的方法开销都较大,并且只能检测是否存在攻击,而对攻击行为没有采取任何措施。本文综合运用参考状态、间隔检测和信誉度,提出一个新的检测方法:ADR,该方法能对检测到的攻击行为采取矫正措施,并重生移动Agent的正确状态。 As a new technology of distributed network computation, mobile agent becomes a focus of researches. The security problems, especially the problems of the agent being attacked by malicious hosts block the wide use of mobile agent technology. A method based on reference states is suggested, but the overhead of this method is too large, and the attack only been checked while nothing have been done to it. In this paper,based on the reference states,alternate detection and reputation a new method named ADR( Using alternate detection and reputation for mobile agent security)has been built up. Thismethod can detect and amend the attack,revise the correct states of the mobile agent.
作者 胡鹏 袁世忠
出处 《计算机应用与软件》 CSCD 北大核心 2006年第11期129-131,141,共4页 Computer Applications and Software
关键词 移动代理安全 参考状态 信誉度 间隔检测 Mobile agent security Reference states Reputation Alternate detection
  • 相关文献

参考文献4

  • 1Vigna. Protecting mobile agents through tracing. In: Proc of the 3rd workshop on Mobile Object Systems Finland, 1997. http://arthur.cs. ucdavis.edu/- barnes/seminar/papers/vigna97.ps.
  • 2Hohl. A protocol to detect malicious hosts attacks by using reference states. University Stuttgart. Tech Rep: TR-1999-09,1999. http://elib.uni-stuttgart. de/opus/volltexte/2000/583/pdf/TR-1999-09. pdf.
  • 3Hohl. A Framework to Protect Mobile Agents by Using Reference States.In: Proc of the 20^th Int'1 Conference on Distributed Computing Systems,Taipei, 2000. http://mole. informatik.uni-stuttgart.de/papers/icdcs2000hohl. pdf.
  • 4B. Yu and M. Singh. Detecting Deception in Reputation Management. In Proceedings of the AAMAS, Melbourne, Australia,2003.20. http://citeseer. ist. psu. edu/yu03detecting.html.

同被引文献7

  • 1魏巍,刘弘.基于关系网模型的Agent联盟形成策略[J].计算机应用研究,2006,23(10):41-43. 被引量:6
  • 2Y Lashkari,M Metral,PMaes.Collaborative InterfaceAgents[C].Proc.of the 12th National Conf.on ArtificialIntelligence,Seattle:AAA I Press,1994:444-449.
  • 3C Roda,N R Jennings,E H Mamdani.The Impact of Het-erogeneity on Cooperating Agents[C].Anaheim:TheAAAI Workshop on Cooperation among HeterogeneousIntelligent Systems,1991.
  • 4LIN Ching,VARADHARAJAN V,WANG Yan,et a1.Trust enhanced security for mobile agents[C].Proceed-ings of the Seventh IEEE International Conference on E-Commerce Technology.Washington DC:IEEE Press,2005:231.
  • 5张云勇 刘锦德.移动agent技术[M].北京:清华大学出版社,2004..
  • 6武小平,邢宏根.基于信任管理模型的移动Agent安全机制研究[J].广西师范大学学报(自然科学版),2008,26(2):114-117. 被引量:4
  • 7李新,吕建,曹春,冯新宇,陶先平.移动Agent系统的安全性研究[J].软件学报,2002,13(10):1991-2000. 被引量:23

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部