期刊文献+

基于时间核查和代码混乱的移动代理安全方案 被引量:1

Security Scheme of Mobile Agent Based on Time Checking and Code Obfuscation
下载PDF
导出
摘要 移动代理是一种可以在计算机网络中进行自主异步传输的程序,具有很好的应用前景;但移动代理安全性问题的存在,严重阻碍了它在实际中的应用。保护代理免受恶意主机的攻击是移动代理系统独有的安全问题。由于代理必须在主机环境中运行,有效解决该问题比较困难。提出一种基于代码控制流混乱和时间核查技术的移动代理保护方案,该方案在实际网络管理系统中进行了验证,能够有效识别恶意主机,移动代理的保护率达95%以上。 Mobile agent (MA)which has a good application prospect is a program that travels autonomously through a computer network in order to perform some computation or gather information. But security is an important issue for the widespread deployment of mobile agents application,especially the protection of mobile agent avoiding attack from malicious host is a unique security problem. It is difficult to solve this problem because agent is completely exposed in remote host and it is easy to be isolat- ed and attacked by the malicious host. A protection scheme of mobile agent based control flow obfuscation and time checking technology is presented in this paper. The protection scheme is tested in actual network management environment ,which can effectively identify the malicious node. The protection ratio of mobile agent reaches over 95%.
出处 《广西师范大学学报(自然科学版)》 CAS 北大核心 2008年第1期253-256,共4页 Journal of Guangxi Normal University:Natural Science Edition
基金 国家教育部博士点基金资助项目(20030145017) 辽宁省自然科学基金资助项目(20042042)
关键词 安全 代理保护 控制流混乱 时间核查 security agent protection control flow obfuscation time checking
  • 相关文献

参考文献8

  • 1ESPARZA O ,SORIANO M,MUNOZ J L,et al. Implementation and performance evaluation of protocol for detecting suspicious hosts [C]//Mobile Agents for Telecommunication Applications (MATA'03),volume 2881 of LNCS. Morocco t Springer-Verlag, 2003 :286-296.
  • 2VIGNA G. Cryptographic traces for mobile agents [C]//VIGNA G. Mobile Agents and Security,Volume 1419 of LNCS ,State of the Art Survey. Heidelberg :Springer-Verlag, 1998 : 137-153.
  • 3YOUNG A ,YUNG M. Sliding encryption:A cryptographic tool for mobile agents[C]//Proc of the 4th Int'l Work shop ,FSE'97. Berlin :Springer-Verlag, 1997:230-240.
  • 4SANDER T. On the cryptographic protection of mobile code[C]//Work shop on Mobile Agents and Security,Berkeley :Springer-Verlag, 1997 : 1-27.
  • 5FARMER W M,et al. Security for mobile agents:Authentication and state appraisal[C]//Proc of the 4th European Symposium on Research in Computer Security (ESOR ICS). New York:Springer-Verlag, 1996 : 118 - 130.
  • 6王汝传,孙开翠,张登银,杨立扬.基于JavaCard的移动代理保护的研究[J].计算机学报,2004,27(4):492-499. 被引量:8
  • 7陈志,王汝传.移动代理网络管理模型的安全性研究[J].南京邮电学院学报(自然科学版),2004,24(2):70-75. 被引量:6
  • 8HOU T W,CHEN H Y,TSAI M H. Three control flow obfuscation methods for java software[J].IEE Proc-Software, 2006,153 (2) : 80-86.

二级参考文献17

  • 1Wilhelm U.G., Staamann S.M., Buttyan L.. A pessimistic approach to trust in mobile agent platforms. IEEE Computing, 2000, 40~48
  • 2Fritz Hohl. A model of attacks of malicious hosts against mobile agents. In: Proceedings of the 4th Workshop on Mobile Object Systems(MOS'98): Secure Internet Mobile Computations, 1998
  • 3Shieh Shiuh-Pyng, Lin Chern-Tang, Wu Shianyow. Optimal assignment of mobile agents for software authorization and protection. Computer Communications, 1999, 22(6): 46~55
  • 4Farmer W.M., Gutman J.D., Swarup V.. Security for mobile agents: Authentication and state appraisal. In: Proceedings of the 4th European Symposium on Research in Computer Security, Rome, Italy, 1996, 118~130
  • 5He Yan-Xiang, Chen Shen-Meng. Design and Applications of Agent and Multi-Agent System. Wuhan: Wuhan University Press, 2001(in Chinese)(何炎祥,陈莘萌. Agent和多Agent系统的设计和应用. 武汉:武汉大学出版社,2001)
  • 6Zhang Yun-Yong. Mobile Agent and Its Application. Beijing: Tsinghua University Press, 2002(in Chinese)(张云勇. 移动Agent及其应用. 北京:清华大学出版社,2002)
  • 7Bruce Schneier. Wu Shi-Xiong, Zhu Shi-Xiong, Zhang Wen-Zheng et al. translate. Applied Cryptography: Protocols, Algorithms and Source Code in C. Second Edition. Beijing: China Machine Press, 2000(in Chinese)(Bruce Schneier著.吴世忠,祝世雄,张文政等译. 应用密码学--协议、算法与C源程序. 北京:机械工业出版社,2000)
  • 8Li Gong. Wang Yun-Kai, Shi Lei, Cao Shao-Wen, Kang Yong translate. Java 2 Platform Security Technology--Architecture, API Design and Realization. Beijing: China Machine Press, 2001(in Chinese)(Li Gong 著.王运凯,石磊,曹少文,康拥译. Java 2平台安全技术--结构、API设计和实现. 北京:机械工业出版社, 2001)
  • 9Chess D.. Security issues in mobile code systems. In: Giovanni Vigna ed.. Mobile Agent Security, LNCS 1419, Springer-Verlag, 1998, 1~14
  • 10Jansen W.A.. Countermeasures for mobile agent security. Computer Communications, 2000, 23(4): 1667~1676

共引文献11

同被引文献8

  • 1JANSEN W A. Countermeasures for mobile agent security[J]. Computer Communications, 2000,23 (17) : 1667 - 1676.
  • 2KARNIK N M,TRIPATHI A R. Security in the ajanta mobile agent system[J]. Software Practice and Experience, 2001,31 (4) : 301-329.
  • 3VARADHARAJAN V. Security enhanced mobile agents[C]//Proeeedings of 7th ACM Conference on Computer and Communications Security, New York :ACM Press ,2000: 200-209.
  • 4WU Xiao-ping,SHEN Zhi-dong,ZHANG Huan-guo. The mobile agent security enhanced by trusted computing technology[C]//The 2nd International Conference on Wireless Communications, Networking and Mobile Computing, Washington DC :IEEE Press, 2006:1-4.
  • 5LIN Ching,VARADHARAJAN V. Trust relationship in mobile agents a reflexive approach[C]//Proceedings of the First International Conference of Agent-Based Technologies and Systems. [S, l. ]:[s. n. ] ,2003:81-88.
  • 6TAN H K,MOREAU L. Trust relationships in a mobile agent system[C]//PICCO G P. Proceedings of Fifth IEEE International Conference on Mobile Agents :LNCS volume 2240. Berlin:Springer-Verlag,2001..15-30.
  • 7Trusted Computing Group. TCG specification architecture overview,specification revision 1.2[EB/OL]. 2004[2008-01-25]. http : //www. trustedeomputinggroup, org/specs/TPM/.
  • 8LIN Ching, VARADHARAJAN V,WANG Yan ,et al. Trust enhanced security for mobile agents [C]//Proceedings of the Seventh IEEE International Conference on E-Commerce Technology. Washington DC:IEEE Press,2005:231.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部