ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Protecting Mobile Agent Against Man-In-The-Middle Attack: The Dummy Agent Model

Journal: International Journal of Advanced Networking and Applications (Vol.13, No. 04)

Publication Date:

Authors : ; ;

Page : 5024-5028

Keywords : Attack; Destination Machine; Man in the Middle; Software Agent; Source Machine;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

With the fast growth of the Internet in the world, playing an important part in our daily activities and with different uses being personal or in business. The idea of the internet is based on transferring data between computers. Agent-Based Software Technology (ABST) is one of the most popular technique to exchange messages and perform the task between devices over the network. The Software Agent (SA) become vulnerable to attacks by Man-in-the-Middle (MitM) during the journey in the network. To secure the software agents against MitM attacks we propose a Dummy Agent Model (DAM) by confusing the attacker and making it difficult to differentiate the real agent with dummy agents. Dummy agents selection model is used to select dummy agents from the historical agent database for every real agent making it more difficult to attacker to identify the real agent among dummy agents. The Dummy Agent Model is proposed as a better approach to active attacks such as DoS, Collision and Alternation attacks.

Last modified: 2022-03-15 17:09:07