Mobile Agents and Security
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science topics
Active In SP
**

Posts: 610
Joined: Jun 2010
#1
02-07-2010, 04:23 PM



.doc   mobileagent.doc (Size: 84 KB / Downloads: 87)

Mobile Agents and Security


Abstract:-

This project and implimentation have the implementation of a distributed agent architecture for intrusion detection and response in networked computers. Unlike conventional intrusion detection systems (IDS), this security system attempts to emulate mechanisms of the natural immune system using Java-based mobile software agents. These security agents monitor multiple levels (packet, process, system, and user) of networked computers to determine correlation among the observed anomalous patterns, reporting such abnormal behavior to the network administrator and/or possibly taking some action to counter a suspected security violation. The project and implimentation focuses on the design aspects of such an intrusion detection system by integrating different artificial intelligence techniques and a mobile agent architecture.



Implementation of security agents monitor multiple levels Packet, Process, System, and user of networked computers to determine correlation among the observed anomalous patterns, reporting such abnormal behavior to the network administrator and/or possibly taking some action to counter a suspected security violation.

¢ Active monitoring

Alter detection policies in response to critical events
¢ Robust
Detect failed components and restore them without stopping the system
¢ Acceptable system performance
Should not interfere with the normal functioning of the host.
¢ Dynamic configurability
¢ Change in configuration of software components, administrative policies
¢ Dynamic extensibility
Addition of new monitoring functions, tools
Implementation Modules :-

1. GUI based Remote Interface Monitoring

Listing a Remote Host
Listing Mobile Agent
Display a Warning
Agent Action
Agent information


2. Designing a Remote Server Application

This module is designed for managing and controlling the agents
Execution of agents on the runtime. A machine that hosts incoming agents is running the Java runtime environment. This runtime must implement facilities for executing agents concurrently. Java provides the ability to run several threads on a Java runtime . Therefore, it is easy to manage several concurrent application processes (called agents) on the same runtime. When an agent needs to execute on the runtime, the runtime creates a new thread which executes the agentâ„¢s program.




Migration of agents between different runtimes. The second important issue when implementing a mobile agent distributed environment is agent migration. When an agent
migrates, two kinds of objects have to be transferred: classes and instances. The classes
constitute the program executed by the agent while the instances compose the execution

3. Mobile Agents

The agent learns about its environment and actions to be more effective. The agent must be able to communicate not only with the master agent at the host but with other agents, too. Through this communication, an agent can collaborate with other agents in the intention to reach its goals





4. User Authentication
Creating
Remove
Change
user key.

5. Implementing Mobile Agents

6. Agent is implemented in Agent Runtime Enviroment

Flow Chart







Software Requirements :-

Language : Java, RMI, SWING
O/S : WIN2000 Server , TCP/IP
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
vids
Active In SP
**

Posts: 9
Joined: Jul 2010
#2
08-07-2010, 11:19 PM

hi frnd,,cn i get more info abt this project and implimentation plzzzzz
as soon as possible....
Reply
projects wizhard
Active In SP
**

Posts: 261
Joined: Jul 2010
#3
12-07-2010, 06:52 PM

There are several external links listed here:
csrc.nist.gov/publications/nistpubs/800-19/sp800-19.pdf
srg.cs.uiuc.edu/Security/cherubim/
informatik.uni-trier.de/~ley/db/conf/mas/mas1998.html

try to collect information from them and search the net for even more info
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
vids
Active In SP
**

Posts: 9
Joined: Jul 2010
#4
12-07-2010, 07:10 PM

hey thnxxx frnd Smile i'll try this
Reply
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#5
29-03-2011, 03:06 PM

ABSTRACT
Mobile Agent Applications and Security

Mobile agents are programs, typically written in a script language, which may be dispatched from a client computer and transported to a remote server computer for execution. Mobile agents offer an important new method of performing transactions and information retrieval in networks. The mobile agent introduces severe concerns for security. We consider the advantages offered by mobile agents and assess them by implementing various applications using it, the creation of a pervasive agent framework facilitates a very large number of network services and applications.
Implementation
Java provides an ideal implementation platform, furnishing tools that help streamline complex software applications. Java’s RMI technology facilitates mobile agent application development, providing key features for distributed network programming. This project and implimentation uses java’s RMI technology as a foundation for mobile agents.
Reply
project topics
Active In SP
**

Posts: 2,492
Joined: Mar 2010
#6
31-03-2011, 02:40 PM

there is lot about Mobile Agents discussed in topicideashow-to-mobile-agent--5431
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Implementation of ATM Security by Using Fingerprint recognition and GSM seminar tips 1 815 01-04-2016, 04:08 PM
Last Post: mkaasees
  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing PPT project girl 1 1,027 21-10-2015, 01:52 PM
Last Post: Guest
  intel centrino mobile technology ppt jaseelati 0 283 05-01-2015, 04:49 PM
Last Post: jaseelati
  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks seminar flower 3 2,769 09-12-2014, 09:25 PM
Last Post: Guest
  SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY ppt project girl 5 2,531 10-06-2014, 11:39 AM
Last Post: java projects
  ON THE EFFECTIVENESS OF MONITORING FOR INTRUSION DETECTION IN MOBILE AD HOC abstract seminar tips 2 817 09-05-2014, 09:43 AM
Last Post: seminar project topic
  Wireless Sensor Network Security model using Zero Knowledge Protocol project uploader 1 1,057 28-02-2014, 01:44 AM
Last Post: mspadmini19
  Online Mobile Phone Shop seminar class 15 12,089 22-10-2013, 07:51 PM
Last Post: vishalonne
  Web based java compiler online with security access Report seminar projects maker 0 546 27-09-2013, 02:14 PM
Last Post: seminar projects maker
  Routing Security in Ad Hoc Wireless Networks seminar projects maker 0 565 26-09-2013, 02:20 PM
Last Post: seminar projects maker