A Comprehensive Agent-Based Safety Solution Meeting the Controllable Work System

Article Preview

Abstract:

This paper proposes and implements a comprehensive software system based on agents and mobile agents techniques, which firstly deals with the network admission control and authorization, adopting the traditional password authentication schema and an intelligent, flexible sensor whose kernel is the NDIS-hooking driver. Agent Message Protocol over UDP/TCP is proposed to secure and encrypt the communication data among stationary agents and server components, which eradicates malicious codes embedded or spread in the internal network. In order to avoid the above software agents mangled or destroyed, the proactive method of Grid Scanning model based on the Agent Message Protocol and Address Resolution Protocol can detect and spoof those clients whose agents are mangled; and if the users forge the logon info, this system can prevent the clients escaping from the control with the dual verification mechanism. Finally, the mobile agent infrastructure with flexible and effortless integration with this security system is introduced and implemented, which supports security access to resources on the controllable clients. Such solution in the internal network satisfies the security-related requirements of availability, expansibility, responsibility, and self-defense, as well as the non-security-related requirements of real-time, veracity, stability and flexibility.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 467-469)

Pages:

1493-1498

Citation:

Online since:

February 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A. D. Mali, On the evaluation of agent behaviors, Artificial Intelligence, 143 (2003), p.1–17.

Google Scholar

[2] G. Czajkowski, T. von Eicken, Jres, A Resource Accounting Interface for Java, ACM Conference on Object Oriented Languages and Systems (OOPSLA), Vancouver, Canada, October (1998).

DOI: 10.1145/286936.286944

Google Scholar

[3] A. Fuggetta, G.P. Picco, G. Vigna, Understanding code mobility, IEEE Transactions on Software Engineering 24 (5) (1998), p.342–361.

DOI: 10.1109/32.685258

Google Scholar

[4] M. Peyravian, A. Roginsky, N. Zunic, Non-PKI methods for public key distribution, Computers & Security, 23 (2004), pp.97-103.

DOI: 10.1016/j.cose.2004.01.011

Google Scholar

[5] Jianlan Zhou, Shan Feng, The implementation of software firewall based on Hook technology, Journal of Huazhong University of Science and Technology, 32(3)(2004), pp.83-85.

Google Scholar

[6] M. Walker, On the security of 3GPP networks, in: Advances in Cryptology–Eurocrypt 2000, Springer, Berlin, (2001), p.102–103.

Google Scholar

[7] Li Chunlin, Li Layuan, Apply agent to build grid service management, Journal of Network and Computer Applications, 26 (2003), p.323–340.

DOI: 10.1016/s1084-8045(03)00018-3

Google Scholar

[8] Li Chunlin, Li Layuan, Agent framework to support the computational grid, Journal of Systems and Software, 70 (2004), p.177–187.

DOI: 10.1016/s0164-1212(03)00056-6

Google Scholar