Mostra el registre d'ítem simple
An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking
dc.contributor.author | Esparza Martín, Óscar |
dc.contributor.author | Muñoz Tapia, José Luis |
dc.contributor.author | Tomás Buliart, Joan |
dc.contributor.author | Soriano Ibáñez, Miguel |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica |
dc.date.accessioned | 2011-01-25T18:37:57Z |
dc.date.available | 2011-01-25T18:37:57Z |
dc.date.created | 2010-04-02 |
dc.date.issued | 2010-04-02 |
dc.identifier.citation | Esparza, O. [et al.]. An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking. "Wireless communications and mobile computing", 02 Abril 2010. |
dc.identifier.issn | 1530-8669 |
dc.identifier.uri | http://hdl.handle.net/2117/11205 |
dc.description.abstract | Mobile agents are software entities consisting of code, data, and state that can migrate autonomously from host to host executing their code. In such scenario there are some security issues that must be considered. In particular, this paper deals with the protection of mobile agents against manipulation attacks performed by the host, which is one of the main security issues to solve in mobile agent systems. This paper introduces an infrastructure for mobile agent watermarking (MAW). MAW is a lightweight approach that can efficiently detect manipulation attacks performed by potentially malicious hosts that might seek to subvert the normal agent operation. MAW is the first proposal in the literature that adapts software watermarks to verify the execution integrity of an agent. The second contribution of this paper is a technique to punish a malicious host that performed a manipulation attack by using a trusted third party (TTP) called host revocation authority (HoRA). A proof-of-concept has also been developed and we present some performance evaluation results that demonstrate the usability of the proposed mechanisms. |
dc.language.iso | eng |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Spain |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica |
dc.subject.lcsh | Mobile agent systems |
dc.subject.lcsh | Host-based intrusion detection systems (Computer security) |
dc.title | An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking |
dc.type | Article |
dc.subject.lemac | Agents mòbils (Programari) -- Mesures de seguretat |
dc.subject.lemac | Ordinadors, Xarxes d' |
dc.contributor.group | Universitat Politècnica de Catalunya. SERTEL - Serveis Telemàtics |
dc.identifier.doi | 10.1002/wcm.941 |
dc.rights.access | Open Access |
local.identifier.drac | 4500524 |
dc.description.version | Postprint (published version) |
local.citation.author | Esparza, O.; Muñoz, J.; Tomàs-Buliart, J.; Soriano, M. |
local.citation.publicationName | Wireless communications and mobile computing |
Fitxers d'aquest items
Aquest ítem apareix a les col·leccions següents
-
Articles de revista [481]
-
Articles de revista [56]