Protecting Mobile Agent Against Man-In-The-Middle Attack: The Dummy Agent Model
Journal: International Journal of Advanced Networking and Applications (Vol.13, No. 04)Publication Date: 2022-02-28
Authors : Mohammed Suliman; Bandar Alluhaybi;
Page : 5024-5028
Keywords : Attack; Destination Machine; Man in the Middle; Software Agent; Source Machine;
Abstract
With the fast growth of the Internet in the world, playing an important part in our daily activities and with different uses being personal or in business. The idea of the internet is based on transferring data between computers. Agent-Based Software Technology (ABST) is one of the most popular technique to exchange messages and perform the task between devices over the network. The Software Agent (SA) become vulnerable to attacks by Man-in-the-Middle (MitM) during the journey in the network. To secure the software agents against MitM attacks we propose a Dummy Agent Model (DAM) by confusing the attacker and making it difficult to differentiate the real agent with dummy agents. Dummy agents selection model is used to select dummy agents from the historical agent database for every real agent making it more difficult to attacker to identify the real agent among dummy agents. The Dummy Agent Model is proposed as a better approach to active attacks such as DoS, Collision and Alternation attacks.
Other Latest Articles
- A Comparative Study On Load Balancing Techniques In Software Defined Networks
- THE IMAGE OF THE MOTHERLAND IN THE POETRY OF FARIZA ONGARSYNOVA
- PREVALENCE OF DEPRESSION, ANXIETY AND STRESS AND ITS ASSOCIATION WITH WORKPLACE SATISFACTION IN MEDICAL COLLEGE TEACHERS
- APPLICATION OF FIXED POINT THEOREM FOR DIGITAL IMAGES
- POLITIQUE SERIELLE: MORALE ET FICTIONDANS LUNIVERS DAZIZA
Last modified: 2022-03-15 17:09:07