A Biological Immune System (BIS) inspired Mobile Agent Platform (MAP) security architecture. / Bagga, Pallavi; Hans, Rahul; Sharma, Vipul.

In: Expert Systems with Applications, Vol. 72, 15.04.2017, p. 269-282.

Research output: Contribution to journalArticle

Published

Standard

A Biological Immune System (BIS) inspired Mobile Agent Platform (MAP) security architecture. / Bagga, Pallavi; Hans, Rahul; Sharma, Vipul.

In: Expert Systems with Applications, Vol. 72, 15.04.2017, p. 269-282.

Research output: Contribution to journalArticle

Harvard

APA

Vancouver

Author

Bagga, Pallavi ; Hans, Rahul ; Sharma, Vipul. / A Biological Immune System (BIS) inspired Mobile Agent Platform (MAP) security architecture. In: Expert Systems with Applications. 2017 ; Vol. 72. pp. 269-282.

BibTeX

@article{028b361e9fe5425fa9e25b64a7d81c97,
title = "A Biological Immune System (BIS) inspired Mobile Agent Platform (MAP) security architecture",
abstract = "The proliferation of malicious entities in the distributed environment poses various serious threats to the protection of Mobile Agent Platform (MAP). Numerous researches have been proposed to ward off the inherent security risks, though these solutions are not enough to identify and remove all the vulnerabilities. In this paper, a self-adaptive IV-Phase MAP Security Architecture is proposed, which is inspired by the Biological Immune System, with the prime objective of detecting unknown malicious mobile agents. In this context, data mining methods are studied for the detection of unknown malicious executable. In particular, Boyer Moore pattern matching algorithm and N-gram feature analysis of mobile agent using a k-Nearest Neighbor Classifier, facilitate the discovery of known and unknown malicious content from incoming mobile agent in the proposed architecture, and protects against the Man In The Middle (MITM) attack, the Masquerading Attack, the Replay attack, the Repudiation attack and the Unauthorized Access Attack. The architecture is designed and implemented in IBM Aglets. A comprehensive 5-fold cross validation scheme on a large collection of malicious and non-malicious files is performed while performing Classification technique involving Feature Selection Method. The propitious experimental outcomes express that the performance (time and security) and accuracy of proposed architecture outperform the earlier known related schemes and makes the proposed architecture suitable for MAP protection in the Mobile Agent Environment (MAE). Above all, these findings exhibit wide-ranging newness, since the concept of machine learning has never been employed so far in the sphere of Mobile Agents System (MAS). Hence the proposed work is likely to be of great interest to the researchers who particularly deal with MAS security.",
author = "Pallavi Bagga and Rahul Hans and Vipul Sharma",
year = "2017",
month = apr,
day = "15",
doi = "10.1016/j.eswa.2016.10.062",
language = "English",
volume = "72",
pages = "269--282",
journal = "Expert Systems with Applications",
issn = "0957-4174",
publisher = "Elsevier Limited",

}

RIS

TY - JOUR

T1 - A Biological Immune System (BIS) inspired Mobile Agent Platform (MAP) security architecture

AU - Bagga, Pallavi

AU - Hans, Rahul

AU - Sharma, Vipul

PY - 2017/4/15

Y1 - 2017/4/15

N2 - The proliferation of malicious entities in the distributed environment poses various serious threats to the protection of Mobile Agent Platform (MAP). Numerous researches have been proposed to ward off the inherent security risks, though these solutions are not enough to identify and remove all the vulnerabilities. In this paper, a self-adaptive IV-Phase MAP Security Architecture is proposed, which is inspired by the Biological Immune System, with the prime objective of detecting unknown malicious mobile agents. In this context, data mining methods are studied for the detection of unknown malicious executable. In particular, Boyer Moore pattern matching algorithm and N-gram feature analysis of mobile agent using a k-Nearest Neighbor Classifier, facilitate the discovery of known and unknown malicious content from incoming mobile agent in the proposed architecture, and protects against the Man In The Middle (MITM) attack, the Masquerading Attack, the Replay attack, the Repudiation attack and the Unauthorized Access Attack. The architecture is designed and implemented in IBM Aglets. A comprehensive 5-fold cross validation scheme on a large collection of malicious and non-malicious files is performed while performing Classification technique involving Feature Selection Method. The propitious experimental outcomes express that the performance (time and security) and accuracy of proposed architecture outperform the earlier known related schemes and makes the proposed architecture suitable for MAP protection in the Mobile Agent Environment (MAE). Above all, these findings exhibit wide-ranging newness, since the concept of machine learning has never been employed so far in the sphere of Mobile Agents System (MAS). Hence the proposed work is likely to be of great interest to the researchers who particularly deal with MAS security.

AB - The proliferation of malicious entities in the distributed environment poses various serious threats to the protection of Mobile Agent Platform (MAP). Numerous researches have been proposed to ward off the inherent security risks, though these solutions are not enough to identify and remove all the vulnerabilities. In this paper, a self-adaptive IV-Phase MAP Security Architecture is proposed, which is inspired by the Biological Immune System, with the prime objective of detecting unknown malicious mobile agents. In this context, data mining methods are studied for the detection of unknown malicious executable. In particular, Boyer Moore pattern matching algorithm and N-gram feature analysis of mobile agent using a k-Nearest Neighbor Classifier, facilitate the discovery of known and unknown malicious content from incoming mobile agent in the proposed architecture, and protects against the Man In The Middle (MITM) attack, the Masquerading Attack, the Replay attack, the Repudiation attack and the Unauthorized Access Attack. The architecture is designed and implemented in IBM Aglets. A comprehensive 5-fold cross validation scheme on a large collection of malicious and non-malicious files is performed while performing Classification technique involving Feature Selection Method. The propitious experimental outcomes express that the performance (time and security) and accuracy of proposed architecture outperform the earlier known related schemes and makes the proposed architecture suitable for MAP protection in the Mobile Agent Environment (MAE). Above all, these findings exhibit wide-ranging newness, since the concept of machine learning has never been employed so far in the sphere of Mobile Agents System (MAS). Hence the proposed work is likely to be of great interest to the researchers who particularly deal with MAS security.

U2 - 10.1016/j.eswa.2016.10.062

DO - 10.1016/j.eswa.2016.10.062

M3 - Article

VL - 72

SP - 269

EP - 282

JO - Expert Systems with Applications

JF - Expert Systems with Applications

SN - 0957-4174

ER -