期刊文献+

PTIR:一个用于检测恶意主机攻击的记录协议 被引量:4

PTIR: A PROTOCOL TRACING INPUTS AND RESULTS TO DETECT MALICIOUS HOST'S ATTACKS
下载PDF
导出
摘要 移动代理作为一种分布计算和移动计算的支撑技术 ,得到广泛研究。但由于移动代理的迁移执行 ,引起一全新安全问题 :如何保护遭主机攻击的移动代理 ?即恶意主机问题 .从检测恶意主机攻击的角度出发 ,人们提出了基于参考状态 (reference states)的方法 .但目前所提出方法的开销都比较大 .认为只需记录移动代理在各主机运行时的输入和运行后的结果即可 .基于此 ,提出新的检测恶意主机攻击的协议 PTIR(a protocol tracing inputs and re-sults to detect m alicious host's attacks) .比较分析表明 。 As a basic technology of distributed computing and mobile computation, mobile agent becomes a focus of researches. Due to its migration in Internet and then execution in many unknown hosts, a new security problem is introduced: how to protect the mobile agent being attacked by some hosts? This is the problem of malicious hosts. In order to detect malicious host's attacks, a method based on reference states is suggested. But the overhead of this method is too large. In this paper, it is supposed to be enough to record the inputs and the results of mobile agent only. According to this point, a new protocol named PTIR (a protocol tracing inputs and results to detect malicious host's attacks) is built up to detect the attacks of malicous hosts. Compared with other protocols, the overhead of this protocol is low.
作者 周冲 孙永强
出处 《计算机研究与发展》 EI CSCD 北大核心 2002年第3期295-300,共6页 Journal of Computer Research and Development
基金 国家自然科学基金 (60 0 73 0 3 3 ) 国家教委博士点基金资助
关键词 移动代理 参考状态 FTIR 恶意主机攻击 PTIR协议 检测 计算机网络 mobile agents security, problem of malicious hosts, reference states
  • 相关文献

参考文献6

  • 1[1]G Vigna. Protecting mobile agents through tracing. In: Proc of the 3rd Workshop on Mobile Object Systems. Finland, 1997. http://arthur.cs.ucdavis.edu/~barnes/seminar/papers/vigna97.ps
  • 2[2]F Hohl. A framework to protect mobile agents by using reference states. In: Proc of the 20th Int'l Conf on Distributed Computing Systems. Taipei, 2000. http://mole.informatik.uni-stuttgart.de/papers/icdcs2000hohl.pdf
  • 3[3]F Hohl. A protocol to detect malicious hosts attacks by using reference states. Universitat Stuttgart. Tech Rep: TR-1999-09, 1999. ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart〖KG-*8 fi/TR-1999-09/TR-1999-09.ps.gz
  • 4[4]C Tschudin. Environmental security: Apoptotic functions, and a way to protect them. In: Proc of the 4th Workshop on Mobile Object System: Secure Internet Mobile Computations. Brussels, 1998. http://cuiwww.unige.ch/~ecoopws/ws98/slides/tschudin.ps
  • 5[5]B S Yee. A sanctuary for mobile agents. In: J Vitek, C Jensen eds. Secure Internet Programming: Security Issues for Mobile and Distributed Objects. New York: Springer-Verlag Inc, 1999. 261~274. http://www.cs.ucsd.edu/~bsy/pub/sanctuary.ps
  • 6[6]W Farmer, J Guttman et al. Security for mobile agents: Authentification and state appraisal. In: Fourth European Symp on Research in Computer Security (ESORICS 96). Rome, 1996. 118~130. http://imps.mcmaster.ca/doc/esorics96.ps

同被引文献12

  • 1Bennet Y S. A Sanctuary for Mobile Agents[Z]. (1997-02-06). http:// www.cs.ucsd.edu/-bsy/pub/sanctuary.ps.
  • 2Dasgupta P. Mobile software agent cabled E-commerce:system design and profit maxmizing agorithms [ D ]. Dissertation.Berkeley, California: University of California, Santa Barbara, 2001.
  • 3Greenberg M S. Mobile agents and security[J]. IEEE Communications Magazine. 1998, 36(6): 1-10.
  • 4Tao T. A Distributed enhanced tuple space-based mobile agent computation model in a Ubicomp World [ D ]. Dissertation.Birmingham, Alabama at: the University of Alabama at Birmingam, 2001.
  • 5Corradi A, Montanari R. Mobile agents protection in the internet environment[A]. In: Computer Software and Applications Conference[ C]. Phoenix: Phoenix the Twenty-Third Annual International, 1999. 80-85.
  • 6Humphries J W. Attack resistant mobile agents for intrusion detection systems [ D ]. Dissertation. Texas: Texas A&M University. 2001.
  • 7Oaks S. Java security(Second edition) [ M ]. Beijing: OReilly & Associates, Inc, 2001. 1-250.
  • 8Vigna G. Protecting Mobile Agents Through Tracing[C]. Mobile Object Systems ECOOP Workshop'97. http://arthur.cs.ucdavis, edu/Nbarnes/seminar/papers/vigna97.ps, 1997.
  • 9Hohl F. A Protocol to Detect Malicious Hosts Attacks by Using Reference States[C]. University at Stuttgart, Fakultat Informatik,Bericht Nr, ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart-fi/TR-1999-09/TR-1999-09.ps.gz, 1999.
  • 10Hohl F. A Framework to Protect Mobile Agents by Using Reference States[C]. In: Proceedings of the 20^th International Conference on Distributed Computing Systems (ICDCS 2000), http://mole.informatik.uni-stuttgart.de/papers/icdcs2000hohl.pd f.

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部