Font Size: a A A

Mobile Agent System Security Issues And Countermeasures

Posted on:2005-08-17Degree:MasterType:Thesis
Country:ChinaCandidate:Y F MengFull Text:PDF
GTID:2208360122496027Subject:Information economy
Abstract/Summary:PDF Full Text Request
In recent years , the rapid development of technology of Internet (in particular its branch WWW) enormously changes the mode in which people process information . In the past, Internet is mainly used in the scientific research domain and receiving and dispatching email, at present, it has been settled on by the multitudinous merchants and become the important platform of electronic commerce, thus impels the further research and application of the Mobile Agent technology. The most important characteristic of Mobile Agent is it has the mobility, and may independently move in the network from a host to another on runs. This flexibility causes the Mobile Agent technology to have very many merits, but simultaneously it also face to de security problem.The secure threats of Mobile Agent mainly come from the mal icious Agent, and also possibly come from the malicious host. In this article, the author proposes a series of countermeasures by which solve secure problems.At first the second chapter of this article introduce the definition and structure of Mobile Agent System , as well as the essential technology applied to the Mobile Agent system. This chapter may let the reader have a basic understanding of the Mobile Agent technology. The third chapter elaborates the secure problem of the Mobile Agent technology. It mainly includes two aspects, namely: Safeguards the host computer not to be attacked by Mobile Agent and safeguards the Mobile Agent not to be attacked by the malicious host. In this article the fourth chapter proposed a brand-new technical - artificial immune system, it mainly uses to safeguard the Mobile Agent not to be attacked by the malicious host. Finally, in the article the fifth chapter introduces the challenges as we] 1 as future development tendency which the Mobile Agent technology faces.
Keywords/Search Tags:Mobile Agent, Malicious host, Secure threat, Secure countermeasures, Artificial immune system
PDF Full Text Request
Related items