Abstract

Recently, agent-based software technology has received wide attention by the research community due to its valuable benefits, such as reducing the load on networks and providing an efficient solution for the transmission challenge problem. However, the major concern in building agent-based systems is related to the security of agents. In this paper, we explore the techniques used to build controls that guarantee both the protection of agents against malicious destination machines and the protection of destination machines against malicious agents. In addition, statistical-based analyses are employed to evaluate the level of maturity of the protection techniques to preserve the protection goals (the code and data, state, and itinerary of the agent), with and without the threat of attacks. Challenges regarding the security of agents are presented and highlighted by seven research questions related to satisfying cyber security requirements, protecting the visiting agent and the visited host machine from each other, providing robustness against advanced attacks that target protection goals, quantifying the security in agent-based systems, and providing features of self-protection and self-communication to the agent itself.

Highlights

  • One of the most important software technologies that is used to manage and perform tasks over the Internet is agentbased software technology (ABST)

  • There are two main classes of approaches proposed in the research field on the security of mobile agents, which are the approaches that secure the agent platform (i.e., DM) against malicious mobile agents and the approaches that secure the mobile agents against malicious platforms

  • There is a clear and strong trade-off between these two security requirements, as it is obvious from their concepts

Read more

Summary

A Survey

Agent-based Software Technology Under the Eyes of Cyber Security, Security Controls, Attacks and Challenges. Abstract—Recently, agent-based software technology has received wide attention by the research community due to its valuable benefits, such as reducing the load on networks and providing an efficient solution for the transmission challenge problem. The major concern in building agent-based systems is related to the security of agents. Challenges regarding the security of agents are presented and highlighted by seven research questions related to satisfying cyber security requirements, protecting the visiting agent and the visited host machine from each other, providing robustness against advanced attacks that target protection goals, quantifying the security in agent-based systems, and providing features of self-protection and self-communication to the agent itself

INTRODUCTION
IMPORTANCE OF ABST IN DISTRIBUTED SYSTEMS
CYBER SECURITY REQUIREMENTS IN THE LIFECYCLE OF MOBILE AGENT
CLASSIFICATION OF SECURITY TECHNIQUES IN MOBILE AGENTS
First Class
ACHIEVING CYBER SECURITY REQUIREMENTS
C I A An
PROTECTION GOALS AND ATTACKS
Protection Goals
Attacks
Classification of Attacks
Maturity Model
VIII. CHALLENGES AND RESEARCH QUESTIONS
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.