dc.contributor.author | Ghossoon, Mohammed Waleed Al-Saadoon | |
dc.date.accessioned | 2009-07-07T08:36:48Z | |
dc.date.available | 2009-07-07T08:36:48Z | |
dc.date.issued | 2009 | |
dc.identifier.citation | Journal of Computer Science, vol.5 (4), 2009, pages 270-274. | en_US |
dc.identifier.uri | http://dspace.unimap.edu.my/123456789/6347 | |
dc.identifier.uri | http://www.scipub.org/scipub/detail_issue.php?V_No=45&j_id=jcs | |
dc.description | Link to publisher's homepage at http://scipub.org/scipub/index.php | en_US |
dc.description.abstract | Problem statement: Wireless application protocol is a protocol that makes it possible to surf the Internet from a cellular phone or other handheld wireless. Many of us that surf the Internet from home with a 56 kbps modem think that it is slow and a cell phone only uses 9.6 kbps so WAP has to take the lesser bandwidth into consideration. For this reason, this study proposed a flexible and reliable system to be implemented by using the characteristic of agents "mobile agent" through wireless application protocol for identification of distributed Intruder. The problem appears when the limitation of data transfer when the distributed systems are used (which includes the heterogeneous database) through internet. For this reason the suggested approach will be the solution to the problem of WAP for mobile agent. Approach: The purpose of this study was to present the ability for dispatch mobile agent from a host to carry out operations directly to the remote point of interest, thus agent's scans provide an appropriate response which is faster than a hierarchical IDS that communicates with a central coordinator based elsewhere on the network. Results: The methodology was used in order to understand the mobile agent mechanism and will introduce the distributed computing mechanisms that are intended for large scale distributed systems. Since the distributed security agent models system was built using mobile agent and net, this will develop small applications for data stores, like sequential query language server. The method used the algorithms built refer to each part of the structure and the rules that implemented (users and the security agent system roles). The result was simulating the intended for business roles for both commercial and government modules, which included the solution to the problem and to architecture to be more flexible and reliable. Conclusion/Recommendations: One of main conclusion for the mobile agent used WAP protocol: To make this protocol secure when transmit the messages in the distributed system using agents chrematistics and Interaction with security agent is multi-mode providing hassle-free access to the user. Security agent alerted the users based on their alert rules. This study had new approach and idea in implementation, also presented the ability to dispatch mobile agent from a host to carry out operations directly to the remote point of interest, thus agent's scans provide an appropriate response which is faster than a hierarchical IDS that communicates with a central coordinator based elsewhere on the network. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Science Publications | en_US |
dc.subject | Cookies and proxy | en_US |
dc.subject | GPRS | en_US |
dc.subject | Security in WAP | en_US |
dc.subject | WAP | en_US |
dc.subject | Global system for mobile communications | en_US |
dc.subject | Mobile communication systems | en_US |
dc.subject | Mobile communication systems -- Security measures | en_US |
dc.title | A flexible and reliable architecture for mobile agent security | en_US |
dc.type | Article | en_US |