{"title":"A taxonomy for attacks on mobile agent","authors":"Mo Chun Man, V.K. Wei","doi":"10.1109/EURCON.2001.938144","DOIUrl":null,"url":null,"abstract":"Although attacks from a hostile environment to mobile agents have been studied, there is still no formal classification of these attacks. This paper examines possible attacks and presents a taxonomy of attacks on mobile agents in a hostile environment. Our taxonomy is complete in the sense that any possible attack is composed entirely of elements classified by the taxonomy. First, a definition of attack is introduced. Then all possible attacks on mobile agents are classified. This taxonomy is used in the analysis of existing schemes and their appropriateness when applied to certain kind of applications. It is also helpful in directing new protection schemes for mobile agents.","PeriodicalId":205662,"journal":{"name":"EUROCON'2001. International Conference on Trends in Communications. Technical Program, Proceedings (Cat. No.01EX439)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"EUROCON'2001. International Conference on Trends in Communications. Technical Program, Proceedings (Cat. No.01EX439)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EURCON.2001.938144","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 25
Abstract
Although attacks from a hostile environment to mobile agents have been studied, there is still no formal classification of these attacks. This paper examines possible attacks and presents a taxonomy of attacks on mobile agents in a hostile environment. Our taxonomy is complete in the sense that any possible attack is composed entirely of elements classified by the taxonomy. First, a definition of attack is introduced. Then all possible attacks on mobile agents are classified. This taxonomy is used in the analysis of existing schemes and their appropriateness when applied to certain kind of applications. It is also helpful in directing new protection schemes for mobile agents.