A protocol for detecting malicious hosts based on limiting the execution time of mobile agents.
Oscar EsparzaMiguel SorianoJose L. MuñozJordi FornéPublished in: ISCC (2003)
Keyphrases
- mobile agents
- detecting malicious
- end hosts
- mobile agent system
- network security
- detect malicious
- fault tolerance
- load balancing
- node failures
- message delivery
- denial of service attacks
- distributed systems
- network management
- intelligent agents
- agent technology
- dos attacks
- ip addresses
- mobile computing
- mobile users
- tcp ip
- computer networks
- lightweight
- information security
- anomaly detection
- cooperative