高级检索
    吴杰宏, 常桂然, 高福祥, 尹 航. 基于数据迷乱和时间核查技术的移动代理保护的研究[J]. 计算机研究与发展, 2009, 46(3): 363-369.
    引用本文: 吴杰宏, 常桂然, 高福祥, 尹 航. 基于数据迷乱和时间核查技术的移动代理保护的研究[J]. 计算机研究与发展, 2009, 46(3): 363-369.
    Wu Jiehong, Chang Guiran, Gao Fuxiang, Yin Hang. Study of Mobile Agent Protection Based on Data Obfuscation and Time Checking[J]. Journal of Computer Research and Development, 2009, 46(3): 363-369.
    Citation: Wu Jiehong, Chang Guiran, Gao Fuxiang, Yin Hang. Study of Mobile Agent Protection Based on Data Obfuscation and Time Checking[J]. Journal of Computer Research and Development, 2009, 46(3): 363-369.

    基于数据迷乱和时间核查技术的移动代理保护的研究

    Study of Mobile Agent Protection Based on Data Obfuscation and Time Checking

    • 摘要: 移动代理(MA)是能够在异构网络中自主迁移的软件实体,它的迁移性和自治性很好地弥补了分布式技术的不足,具有广阔的应用前景;但移动代理安全性问题的存在,严重阻碍了它在实际中的应用.保护代理免受恶意主机的攻击是移动代理系统独有的安全问题.由于代理必须在主机环境中运行,有效解决该问题比较困难.提出一种基于迷乱代理数据变量和时间核查技术的移动代理保护方案,同时给出获得时间核查技术中主要数据的方法.该方案在实际网络管理环境中进行了验证,能够有效地识别恶意主机,移动代理的保护率达95%以上.

       

      Abstract: Mobile agents (MA) are autonomous software entities that are able to migrate across heterogeneous network execution environments. Mobility and autonomy compensate the deficiencies of distributed technology pretty well. Thus, mobile agents have wide application prospects. But security is an important issue for the widespread deployment of mobile agents applications. Especially the protection of mobile agents from attacks of malicious hosts is a unique security problem of mobile agent systems. It is difficult to solve this problem because agent is completely exposed in remote host and it is easy to be isolated and attacked by the malicious host. A protection scheme of mobile agents based on obfuscated agent data variables and time checking technology is presented in this paper. A method of how to obtain related data in time checking is given also. The idea of the time checking is based on limiting the execution time of the MA on the destination hosts. The original host checks three inequalities for the security of the hosts on the itinerary during the execution of the MA. If any of them is not satisfied, the hosts on both sides are suspicious. Through this time checking scheme, all the malicious hosts can be detected. The protection scheme is tested in actual network management environment, which can effectively identify the malicious host. The MA protection ratio reaches over 95%.

       

    /

    返回文章
    返回