Open Access Open Access  Restricted Access Subscription Access

Protecting Mobile Agent against Man-In-The- Middle Attack: The Dummy Agent Model


Affiliations
1 Faculty of Computer Studies, Arab Open University, Saudi Arabia
 

With the fast growth of the Internet in the world, playing an important part in our daily activities and with different uses being personal or in business. The idea of the internet is based on transferring data between computers. Agent-Based Software Technology (ABST) is one of the most popular technique to exchange messages and perform the task between devices over the network. The Software Agent (SA) become vulnerable to attacks by Man-in-the-Middle (MitM) during the journey in the network. To secure the software agents against MitM attacks we propose a Dummy Agent Model (DAM) by confusing the attacker and making it difficult to differentiate the real agent with dummy agents. Dummy agents selection model is used to select dummy agents from the historical agent database for every real agent making it more difficult to attacker to identify the real agent among dummy agents. The Dummy Agent Model is proposed as a better approach to active attacks such as DoS, Collision and Alternation attacks.



Keywords

Attack, Destination Machine, Man in the Middle, Software Agent, Source Machine.
User
Notifications
Font Size

  • B. Alluhaybi, M. Shady, A. Alzhrani, and V. Thayananthan, “A survey: Agent-based software technology under the eyes of cybersecurity, security controls, attacks and challenges,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 8, p. 1-21, 2019.
  • R. J. Victorelli, Remote procedure call management U.S. Patent 10 p. 015-283, Jul. 3, 2018.
  • Y. Song, A. J. Carter, J. D. Ehrlich, and S. M. Meyer, Message passing in a distributed graph database, U.S. Patent 9 990 443, Jun. 5, 2018.
  • D. B. Lange and M. Oshima, Seven good reasons for mobile agent's Commun. ACM, vol. 42, no. 3, p. 88-89, Mar. 1999.
  • M. Wooldridge, and N. R. Jennings Software Engineering with Agents: Pitfalls and Pratfalls” in IEEE Internet Computing, 3 (3), May/June 1999.
  • B. Alluhaybi, M. S. Alrahhal, A. Alzahrani and V. Thayananthan, Dummy-Based Approach for Protecting Mobile Agents Against Malicious Destination Machines, IEEE Access, vol. 8, p. 129320-129337, 2020.
  • Amira Hassan, Internet of Things (IoT) Technologies for Empowering E-Education in Digital campuses of Smart Cities, International Journal of Advanced Networking and Applications (IJANA), Volume 11 Issue 1, p. 4142-4149, 2021.
  • A. Caglayan and C. Harrison, Agent Sourcebook. Hoboken, NJ, USA: Wiley, 1997.
  • F. Bergenti, E. Iotti, and A. Poggi, “Core features of an agent-oriented domain-speci_c language for JADE agents,” in Trends in Practical Appli-cations of Scalable Multi-Agent Systems, the PAAMS Collection. Cham, Switzerland: Springer, p. 213-224, 2016.
  • F. Linna and L. Jun, “A free-roaming mobile agent security protocol against colluded truncation attack,” in Proc. 2nd Int. Conf. Educ. Technol. Comput., vol. 5, Jun. 2010, p. V5-261.
  • D. Xu, L. Harn, M. Narasimhan, and J. Luo, ``An improved free-roaming mobile agent security protocol against colluded truncation attacks,'' inProc. 30th Annu. Int. Comput. Softw. Appl. Conf. (COMPSAC), vol. 2, p. 309-314, Sep. 2006.
  • B. Amro, “Mobile agent systems, recent security threats and counter measures,” 2014, arXiv:1410.4147. [Online]. Available: http://arxiv.org/abs/1410.4147
  • B. Bhushan, G. Sahoo and A. K. Rai, Man-in-themiddle attack in wireless and computer networking — A review, 3rd International Conference on Advances in Computing,Communication & Automation (ICACCA) , p. 1-6, 2017.
  • S. Srivastava and G. C. Nandi, “Fragmentation based encryption approach for self protected mobile agent,” J. King Saud Univ.-Comput. Inf. Sci., vol. 26, no. 1, p. 131-142, Jan. 2014.
  • L. Badger, “Self-protecting mobile agents obfuscation techniques evaluation report,” Netw. Associates Lab., Rockville, MD, USA, Tech. Rep. 01-036, 2002.
  • B. S. Yee, “A sanctuary for mobile agents,” in Secure Internet Program- ming. Berlin, Germany: Springer, 1999, p. 261-273.
  • P. Bagga and R. Hans, Mobile agent system security: A systematic survey, ACM Comput. Surv., Vol. 50, (5), p. 65, Nov. 2017.

Abstract Views: 107

PDF Views: 0




  • Protecting Mobile Agent against Man-In-The- Middle Attack: The Dummy Agent Model

Abstract Views: 107  |  PDF Views: 0

Authors

Mohammed Suliman
Faculty of Computer Studies, Arab Open University, Saudi Arabia
Bandar Alluhaybi
Faculty of Computer Studies, Arab Open University, Saudi Arabia

Abstract


With the fast growth of the Internet in the world, playing an important part in our daily activities and with different uses being personal or in business. The idea of the internet is based on transferring data between computers. Agent-Based Software Technology (ABST) is one of the most popular technique to exchange messages and perform the task between devices over the network. The Software Agent (SA) become vulnerable to attacks by Man-in-the-Middle (MitM) during the journey in the network. To secure the software agents against MitM attacks we propose a Dummy Agent Model (DAM) by confusing the attacker and making it difficult to differentiate the real agent with dummy agents. Dummy agents selection model is used to select dummy agents from the historical agent database for every real agent making it more difficult to attacker to identify the real agent among dummy agents. The Dummy Agent Model is proposed as a better approach to active attacks such as DoS, Collision and Alternation attacks.



Keywords


Attack, Destination Machine, Man in the Middle, Software Agent, Source Machine.

References