Preemptive mobile code protection using spy agents. / Kalogridis, Georgios.

2011. 299 p.

Research output: ThesisDoctoral Thesis

Unpublished

Standard

Preemptive mobile code protection using spy agents. / Kalogridis, Georgios.

2011. 299 p.

Research output: ThesisDoctoral Thesis

Harvard

Kalogridis, G 2011, 'Preemptive mobile code protection using spy agents', Ph.D., Royal Holloway, University of London.

APA

Vancouver

Author

BibTeX

@phdthesis{9206cfe53bee452b8962557f4e0c414a,
title = "Preemptive mobile code protection using spy agents",
abstract = "This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts in mobile code scenarios. In this security paradigm, a spy agent, i.e. a mobile agent which circulates amongst a number of remote hosts, can employ a variety of techniques in order to both appear 'normal' and suggest to a malicious host that it can 'misuse' the agent's data or code without being held accountable.A framework for the operation and deployment of such spy agents is described. Subsequently, a number of aspects of the operation ofsuch agents within this framework are analysed in greater detail.The set of spy agent routes needs to be constructed in a manner thatenables hosts to be identified from a set of detectable agent-specific outcomes.The construction of route sets that both reduce the probability of spy agentdetection and support identification of the origin of a maliciousact is analysed in the context of combinatorial group testingtheory. Solutions to the route set design problem are proposed.A number of spy agent application scenarios are introduced andanalysed, including: a) the implementation of a mobile code email honeypot system for identifying email privacy infringers, b)the design of sets of agent routes that enable malicious hostdetection even when hosts collude, and c) the evaluationof the credibility of host classification resultsin the presence of inconsistent host behaviour. Spy agents can be used in awide range of applications, and it appears that each applicationcreates challenging new research problems, notably in the design ofappropriate agent route sets.",
keywords = "Spy agents, Group testing, Combinatorial designs, Kalogridis",
author = "Georgios Kalogridis",
year = "2011",
language = "English",
school = "Royal Holloway, University of London",

}

RIS

TY - THES

T1 - Preemptive mobile code protection using spy agents

AU - Kalogridis, Georgios

PY - 2011

Y1 - 2011

N2 - This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts in mobile code scenarios. In this security paradigm, a spy agent, i.e. a mobile agent which circulates amongst a number of remote hosts, can employ a variety of techniques in order to both appear 'normal' and suggest to a malicious host that it can 'misuse' the agent's data or code without being held accountable.A framework for the operation and deployment of such spy agents is described. Subsequently, a number of aspects of the operation ofsuch agents within this framework are analysed in greater detail.The set of spy agent routes needs to be constructed in a manner thatenables hosts to be identified from a set of detectable agent-specific outcomes.The construction of route sets that both reduce the probability of spy agentdetection and support identification of the origin of a maliciousact is analysed in the context of combinatorial group testingtheory. Solutions to the route set design problem are proposed.A number of spy agent application scenarios are introduced andanalysed, including: a) the implementation of a mobile code email honeypot system for identifying email privacy infringers, b)the design of sets of agent routes that enable malicious hostdetection even when hosts collude, and c) the evaluationof the credibility of host classification resultsin the presence of inconsistent host behaviour. Spy agents can be used in awide range of applications, and it appears that each applicationcreates challenging new research problems, notably in the design ofappropriate agent route sets.

AB - This thesis introduces 'spy agents' as a new security paradigm for evaluating trust in remote hosts in mobile code scenarios. In this security paradigm, a spy agent, i.e. a mobile agent which circulates amongst a number of remote hosts, can employ a variety of techniques in order to both appear 'normal' and suggest to a malicious host that it can 'misuse' the agent's data or code without being held accountable.A framework for the operation and deployment of such spy agents is described. Subsequently, a number of aspects of the operation ofsuch agents within this framework are analysed in greater detail.The set of spy agent routes needs to be constructed in a manner thatenables hosts to be identified from a set of detectable agent-specific outcomes.The construction of route sets that both reduce the probability of spy agentdetection and support identification of the origin of a maliciousact is analysed in the context of combinatorial group testingtheory. Solutions to the route set design problem are proposed.A number of spy agent application scenarios are introduced andanalysed, including: a) the implementation of a mobile code email honeypot system for identifying email privacy infringers, b)the design of sets of agent routes that enable malicious hostdetection even when hosts collude, and c) the evaluationof the credibility of host classification resultsin the presence of inconsistent host behaviour. Spy agents can be used in awide range of applications, and it appears that each applicationcreates challenging new research problems, notably in the design ofappropriate agent route sets.

KW - Spy agents

KW - Group testing

KW - Combinatorial designs

KW - Kalogridis

M3 - Doctoral Thesis

ER -