Font Size: a A A

The Research And Implementation Of Network Attack System Based On Self-Adaptive And Mobile Agents

Posted on:2010-10-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2178360278456733Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Currently, the researches on network attack technology are active in the field of network security. The shortcomings of traditional attack technologies have limitted the effectiveness of their attacks, including difficult to detect the changes of situated environments, more dependent on network bandwith, unalterable to objectives and functions, and etc, Moreover, with the progress of network security, many network attack technologies have drawbacks on information gathering, vulnerability searching, plant back door and identity hidden.The self-adaptive and mobile agent technologies enable agent to move into the target host and attack it, decrease communication, perceive the environment and change its behaviour specifications autonomously in order to adapt the changes of the environments. Therefore, self-adaptive and mobile agent technology has the abilities of automonous mobile attack and adaptability to changes of network environments, which can improve the effectiveness and provide a novel solution to network attack.The thesis contributes mainly on the following aspects.Firstly, we introduce the state-of-the-art of the network attack technology, analyze and discuss the shortcomings of the traditional network attack technology in its robustness, dependability, maintainability. We present a new mothod of network attack based on self-adaptive and mobile agent technology which has the capabilities of adaptability, mobility and distribution to overcome the shortcomings of traditional network attack.Secondly, based on the agent-oriented software methodology ODAM, we analyze and establish the requirement models of NASMA, including organization structure model, organization scene model, organization interaction model, role activity model, and role transfer model. Moreover, the technical framework is designed based on self-adaptive and mobile agent technology.Thirdly, based on the development platform of self-adaptive multi-agent systems, SADE, NASMA is constructed and implemented. The system has such functions as DDoS attack, steal file attack, logical bomb attack, scan the port of object attack, keyboard record attack, and agent reproduction. A case, stealing files from remote host, is studied to represent interfaces of the system and illustrate the processing of network attacks.
Keywords/Search Tags:Mobile Agent, Self-adaptive Agent, Network Attack, ODAM, SADE
PDF Full Text Request
Related items