{"title":"Applying trust policies for protecting mobile agents against DoS","authors":"Biljana Cubaleska, Markus Schneider","doi":"10.1109/POLICY.2002.1011307","DOIUrl":null,"url":null,"abstract":"In the world of mobile agents, security aspects are extensively being discussed. Denial of service (DoS) attacks are of considerable interest, i.e., when malicious hosts either delete received agents or prevent them from continuing their route. This paper presents a method for a posteriori identification of such malicious hosts to build a trust policy. Depending on how much the agent owner trusts the hosts, he can either define an appropriate order in which selected hosts should be visited, or he can decide which hosts he does not want to contact again. We also show how the sequence of hosts should be determined in order to minimize some costs.","PeriodicalId":370124,"journal":{"name":"Proceedings Third International Workshop on Policies for Distributed Systems and Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings Third International Workshop on Policies for Distributed Systems and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/POLICY.2002.1011307","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
In the world of mobile agents, security aspects are extensively being discussed. Denial of service (DoS) attacks are of considerable interest, i.e., when malicious hosts either delete received agents or prevent them from continuing their route. This paper presents a method for a posteriori identification of such malicious hosts to build a trust policy. Depending on how much the agent owner trusts the hosts, he can either define an appropriate order in which selected hosts should be visited, or he can decide which hosts he does not want to contact again. We also show how the sequence of hosts should be determined in order to minimize some costs.