Affiliation:
1. Huazhong University of Science and Technology
Abstract
This paper proposes and implements a comprehensive software system based on agents and mobile agents techniques, which firstly deals with the network admission control and authorization, adopting the traditional password authentication schema and an intelligent, flexible sensor whose kernel is the NDIS-hooking driver. Agent Message Protocol over UDP/TCP is proposed to secure and encrypt the communication data among stationary agents and server components, which eradicates malicious codes embedded or spread in the internal network. In order to avoid the above software agents mangled or destroyed, the proactive method of Grid Scanning model based on the Agent Message Protocol and Address Resolution Protocol can detect and spoof those clients whose agents are mangled; and if the users forge the logon info, this system can prevent the clients escaping from the control with the dual verification mechanism. Finally, the mobile agent infrastructure with flexible and effortless integration with this security system is introduced and implemented, which supports security access to resources on the controllable clients. Such solution in the internal network satisfies the security-related requirements of availability, expansibility, responsibility, and self-defense, as well as the non-security-related requirements of real-time, veracity, stability and flexibility.
Publisher
Trans Tech Publications, Ltd.
Subject
Mechanical Engineering,Mechanics of Materials,General Materials Science
Reference8 articles.
1. A. D. Mali, On the evaluation of agent behaviors, Artificial Intelligence, 143 (2003), p.1–17.
2. G. Czajkowski, T. von Eicken, Jres, A Resource Accounting Interface for Java, ACM Conference on Object Oriented Languages and Systems (OOPSLA), Vancouver, Canada, October (1998).
3. A. Fuggetta, G.P. Picco, G. Vigna, Understanding code mobility, IEEE Transactions on Software Engineering 24 (5) (1998), p.342–361.
4. M. Peyravian, A. Roginsky, N. Zunic, Non-PKI methods for public key distribution, Computers & Security, 23 (2004), pp.97-103.
5. Jianlan Zhou, Shan Feng, The implementation of software firewall based on Hook technology, Journal of Huazhong University of Science and Technology, 32(3)(2004), pp.83-85.