CFP last date
22 April 2024
Reseach Article

Simulation of Dynamic Mobile Agent Model to Prevent Denial of Service Attack using CPNS

by Mayank Aggarwal, Nupur, Pallavi Murgai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 20 - Number 1
Year of Publication: 2011
Authors: Mayank Aggarwal, Nupur, Pallavi Murgai
10.5120/2398-3186

Mayank Aggarwal, Nupur, Pallavi Murgai . Simulation of Dynamic Mobile Agent Model to Prevent Denial of Service Attack using CPNS. International Journal of Computer Applications. 20, 1 ( April 2011), 19-25. DOI=10.5120/2398-3186

@article{ 10.5120/2398-3186,
author = { Mayank Aggarwal, Nupur, Pallavi Murgai },
title = { Simulation of Dynamic Mobile Agent Model to Prevent Denial of Service Attack using CPNS },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 20 },
number = { 1 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 19-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume20/number1/2398-3186/ },
doi = { 10.5120/2398-3186 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:06:39.554320+05:30
%A Mayank Aggarwal
%A Nupur
%A Pallavi Murgai
%T Simulation of Dynamic Mobile Agent Model to Prevent Denial of Service Attack using CPNS
%J International Journal of Computer Applications
%@ 0975-8887
%V 20
%N 1
%P 19-25
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Agents are soft wares migrating from one node to another to fulfill the task of its owner. In Static mobile agents, agent travels on the predefined path whereas in Dynamic mobile agents, agent route is decided by the host or the agent itself, which makes security much more difficult in it. Mobile agents are not properly utilized because of security concerns. Security becomes more challenging in Dynamic mobile agents as compared to Static mobile agent. One such challenge is ‘Denial of Service’, in it the malicious host may deny resources required by the agent and kill the agent, thus the result computed so far is lost and this may happen every time the agent visits any malicious host. Colored Petri Nets (CPNs) is a language for the modeling and validation of systems in which concurrency, synchronization and communication play a major role. In our previous paper we have simulated and obtained the results for static mobile agent but in real world agents are dynamic. This paper simulates dynamic mobile agent model that enables the owner of the agent to detect the malicious host. The simulation has been done using CPNs, the result clearly proves that owner can detect the malicious hosts and thus prevent Denial of service attack to occur in future

References
  1. Antonio Corradi, Marco Cremonini, Rebecca Montanari, and Cesare Stefanelli. Mobile agents integrity for electronic commerce applications. Information Systems, 24(6), 1999.
  2. Cao, Chun andLu, Jian 'Path-history-based access control for mobile agents', International Journal of Parallel, Emergent and Distributed Systems, vol 21: 3, pp 215 - 225, 2006.
  3. CPN Tools website: www.daimi.au.dk/CPNtools
  4. Dirk Westhoff, Markus Schneider, Claus Unger, and Firoz Kaderali. Methods for protecting a mobile agent’s route. In Information Security, Second International Workshop (ISW’99), number 1729 in LNCS. Springer Verlag, 1999.
  5. Dirk Westhoff, Markus Schneider, Claus Unger, and Firoz Kaderali. Protecting a mobile agent’s route against collusions. In Selected Areas in Cryptography, 6th Annual International Workshop (SAC’99), number 1758 in LNCS. Springer Verlag, 2000.
  6. Dong Chun Lee and Jeom Goo Kim. Adaptive migration strategy for mobile agents on internet. In Technologies for E-Services (TES 2001), Second International Workshop, Proceedings, number 2193 in LNCS. Springer Verlag, 2001.
  7. Fred B. Schneider. Towards fault-tolerant and secure agentry. In Distributed Algorithms, 11th International Workshop (WDAG’97), Proceedings, number 1320 in LNCS. Springer Verlag, 1997.
  8. Garrigues, C., et al. Promoting the development of secure mobile agent applications. J. Syst. Software (2009), doi:10.1016/ j.jss.2009.11.001
  9. Giovanni Vigna. Cryptographic traces for mobile agents. In G. Vigna, editor, Mobile Agents and Security, number 1419 in LNCS. Springer Verlag, 1998.
  10. Lotfi Benachenhou, Samuel Pierre, ” Protection of a mobile agent with a reference clone,” Elsevier , Computer Communications , vol 29, pp. 268-278, 2006.
  11. M.Aggarwal,Nupur,Pallavi, " Protecting Dynamic Mobile Agent against Denial of Service Attacks",AIP,Conference Proceedings,1324 (316),pp 316-318,2010.
  12. M. Schenider, B.Cubaleska “A method of protecting mobile agents against denial of service attacks” , Springer-Verlag Berlin Heidelberg , LNAI 2446, pp. 297–311, 2002.
  13. N.Desai,K.Garg,M.Mishra, Modelling Hierrarchical Mobile Agent Security Prorotocol Using CP Nets, Springer-Verlag Berlin Heidelberg, LNCS 4873, pp 637-649,2007.
  14. Price, Sean M. 'Host-Based Security Challenges and Controls: A Survey of Contemporary Research', Information Security Journal: A Global Perspective, vol 17: 4, pp 170 — 178, 2008.
  15. Stefan Dobrev, Paola Flocchini, Guiseppe Prencipe, and Nicola Santoro. Mobile search for a black hole in an anonymous ring. In Distributed Computing (DISC 2001), 15th International Conference, Proceedings, number 2180 in LNCS. Springer Verlag, 2001.
  16. Tomas Sander and Christian F. Tschudin. Protecting mobile agents against malicious hosts. In G. Vigna, editor, Mobile Agents and Security, number 1419 in LNCS. Springer Verlag, 1998.
  17. Venkatesan S, et al. “Advanced mobile agent security models for code integrity and malicious availability check.”, J Network Comput Appl, doi:10.1016/j.jnca.2010.03.010 ,2010 .
  18. W.A.Jansen, “Countermeasures for mobile agent security,” Elsevier, Computer Communications, vol. 23 , pp. 1667-1676 , 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Dynamic mobile agent of service attack colored petrinets independent and dependent mobile agent