Mobile Agent

                                                                                Back to Project List
                                        Domain Description

            In computer science, a mobile agent is a composition of computer software and data which is able to migrate (move) from one computer to another autonomously and continue its execution on the destination computer.

                                      

1. SHARED STORAGE IN J2ME: A MULTI AGENT SYSTEM APROACH(IEEE-2009)

                                                                                                   View Abstract

                  Current research trend towards mobile computing emphasizes the need for distribution of data among various clients in wireless environment. Sharing the data in J2ME opens the data to be accessible for all MIDLETs present on the device, hence creating a number of vulnerabilities to the confidential information that is intended to be shared with specific MIDLETs, e.g. a malicious MIDLET can delete, copy or move the Shared Record Store, in J2ME based application. This project aims at overcoming record store sharing problem through the concept of Multi- Agent System by providing a shared storage with explicit access to authenticated & authorized MIDLETs. With this mechanism data can be shared among specific MIDLETs. The implementation uses the SAGE-Lite framework as a solution to our proposed work.

System Requirement Specification:-
DOMAIN     : TRANSACTIONS ON MOBILE APPLICATION
SOFTWARE : Operating System: windows xp, Platform: JAVA /J2ME MOBILE AGENT: SAGE_LITE
HARDWARE : Processor: Pentium-IV Speed: 1.8 GHZ RAM: 512 MB HDD: 80 GB

2. A DISTRIBUTED INTRUSION DETECTION SYSTEM USING MOBILE AGENTS (IEEE)

                                                                                                    View Abstract

                  DIDMA uses a set of software entities called mobile agents that can move from one node to another node within a network, and perform the task of aggregation and correlation of the intrusion related data that it receives from another set of software entities called the static agents. Mobile agents reduce network bandwidth usage by moving data analysis computation to the location of the intrusion data, support heterogeneous plat-forms, and offer a lot of flexibility in creating distributed IDS. DIDMA utilizes the above-mentioned beneficial features offered by mobile agent technology and addresses some of the issues with centralized IDS models. It has been tested using some well-known attacks and performances have been compared with centralized IDS models.
                 Modules
                 ø Static Agents (SA)
                 ø Mobile Agents (MA)
                 ø Mobile Agents Dispatcher (MAD) & VHL
                 ø Alerting Agent (AA) and IDS console.
                 ø The VHL is a subcomponent of the MAD.

System Requirement Specification:-
DOMAIN     : TRANSACTION ON NETWORKING
SOFTWARE : Operating System: windows xp; Platform: JAVA, Protocol : TCP /IP,
                   Back End: Ms-access
HARDWARE : Processor: Pentium-IV, Speed: 1.8 GHZ, RAM: 512 MB, HDD: 80 GB

3. ACTIVE MONITORING OF NETWORKS USING MOBILE AGENTS (UNIVERSITY OF   
    MINNESOTA)

                                                                                                    View Abstract

            The goal of a network monitoring system is to ensure proper system operation by watching for inconsistencies in user activities, system configuration, and resource status. In an enterprise-computing environment, one important functionality of a monitoring system is to guard system resources from misuse or intrusion. The system presents of a computing environment, such as network traffic, host level activities, system configuration, file system and user activities.
                Mobile agent technology offers a new computing paradigm in which a Program, in the form of a software agent, can suspend its execution on a host computer; transfer itself to another agent-enabled host on the network, and resume execution on the new host. The use of mobile code has a long history dating back to the use of remote job entry systems in the 1960's. Today's agent incarnations can be characterized in a number of ways ranging from simple distributed objects to highly organized software with Embedded intelligence. As the sophistication of mobile software has increased over time, so too have the associated threats to security.
             The new phase of evolution is now under way that goes one step further, allowing complete mobility of cooperating applications among supporting platforms to form a large-scale, loosely coupled distributed system. Whether this evolutionary branch successfully propagates forward or eventually dies out remains to be seen.
Nevertheless, the technology is intriguing and offers a new paradigm for computing that cannot be summarily dismissed. The catalysts for this evolutionary path are mobile software agents � programs that are goal directed and capable of suspending themselves on one platform and moving to another platform where they resume execution. More precisely,
A software agent is a program that can exercise an individual or organization's authority, work autonomously toward a goal, and meet and interact with other agents. Possible interactions among agents include contract and service negotiation, auctioning, and bartering. Agents may be either stationary, always resident at a single platform, or mobile, capable of moving among different platforms at different times.
            The reader is referred to [0] for a more extensive introduction to the subject. This paper focuses mainly on the security issues that arise when mobility comes into play. A spectrum of differing shades of mobility exists, corresponding to the possible variations of relocating code and state information, including the values of instance variables, the program counter, execution stack, etc.

System Requirement Specification:-
DOMAIN     : MOBILE COMPUTING
SOFTWARE : Operating System: windows xp, Platform: JAVA
HARDWARE : Processor:Pentium-IV, Speed:1.8 GHZ RAM: 512 MB HDD: 80 GB

4. ADVANCED NETWORK SECURITY FOR ANTIMONEY LAUNDERING SYSTEM USING MOBILE 
    AGENTS

                                                                                                    View Abstract

                 Money laundering is the process by which criminals attempt to hide and disguise the true origin and ownership of the proceeds of criminal activities, thereby avoiding prosecution, conviction and confiscation of criminal funds. The attempted use of financial system to launder money has been recognized a global problem. The international community has recognized money laundering as a serious crime and for fighting this menace stricter laws have been enacted in several countries and penalties imposed for those found guilty. In India a legislation on prevention of money laundering is pending before the Parliament and specific statutory anti-money laundering procedures would be introduced once the Bill is passed and the enactment comes into force. In order to face the challenge of the Money Laundry crimes, the RBI has advised banks to formulate policy to help in curbing the use of banking system for Money Laundering. The policy is based on the anti-money laundering systems and procedures adopted by the banking system world over to stop the use of banking channels for money laundering and assist law enforcement authorities in tackling this problem.

System Requirement Specification:-
DOMAIN      : WEB APLICATION NETWORK SECURITY
SOFTWARE : Operating System: windows xp, JAVA/J2EE, DB:MySQL,
                  Application Server: Weblogic8.0, Algorithm: SAX,DOM
HARDWARE : Processor: Pentium-IV Speed: 1.8 GHZ RAM: 512 MB HDD: 80 GB



                                                       
                                                                                                                                Back to Project List