A Survey: Agent-based Software Technology Under the Eyes of Cyber Security, Security Controls, Attacks and Challenges
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 8
Abstract
Recently, agent-based software technology has received wide attention by the research community due to its valuable benefits, such as reducing the load on networks and providing an efficient solution for the transmission challenge problem. However, the major concern in building agent-based systems is related to the security of agents. In this paper, we explore the techniques used to build controls that guarantee both the protection of agents against malicious destination machines and the protection of destination machines against malicious agents. In addition, statistical-based analyses are employed to evaluate the level of maturity of the protection techniques to preserve the protection goals (the code and data, state, and itinerary of the agent), with and without the threat of attacks. Challenges regarding the security of agents are presented and highlighted by seven research questions related to satisfying cyber security requirements, protecting the visiting agent and the visited host machine from each other, providing robustness against advanced attacks that target protection goals, quantifying the security in agent-based systems, and providing features of self-protection and self-communication to the agent itself.
Authors and Affiliations
Bandar Alluhaybi, Mohamad Shady Alrahhal, Ahmed Alzhrani, Vijey Thayananthan
Fish Image Segmentation Algorithm (FISA) for Improving the Performance of Image Retrieval System
The image features (local, global) pay vital role in image retrieval system. The effectiveness of these image features depends on the application domain, i.e., in some domains the global features generate better results...
Modified Hierarchical Method for Task Scheduling in Grid Systems
This study aims to increase the productivity of grid systems by an improved scheduling method. A brief overview and analysis of the main scheduling methods in grid systems are presented. A method for increasing efficienc...
Intrusion Detection System in Wireless Sensor Networks: A Review
The security of wireless sensor networks is a topic that has been studied extensively in the literature. The intrusion detection system is used to detect various attacks occurring on sensor nodes of Wireless Sensor Netwo...
Collective Movement Method for Swarm Robot based on a Thermodynamic Model
In this paper, a distributed collective movement control method is proposed for a swarm robotics system based on an internal energy thermodynamic model. The system can move between obstacles with a changing aggregation s...
Hybrid Denoising Method for Removal of Mixed Noise in Medical Images
Nowadays, Digital image acquisition and processing techniques plays a very important role in current day medical diagnosis. During the acquisition process, there could be distortions in the images, which will negat...