Show simple item record

dc.contributor.authorGhossoon, Mohammed Waleed Al-Saadoon
dc.date.accessioned2009-07-07T08:36:48Z
dc.date.available2009-07-07T08:36:48Z
dc.date.issued2009
dc.identifier.citationJournal of Computer Science, vol.5 (4), 2009, pages 270-274.en_US
dc.identifier.urihttp://dspace.unimap.edu.my/123456789/6347
dc.identifier.urihttp://www.scipub.org/scipub/detail_issue.php?V_No=45&j_id=jcs
dc.descriptionLink to publisher's homepage at http://scipub.org/scipub/index.phpen_US
dc.description.abstractProblem statement: Wireless application protocol is a protocol that makes it possible to surf the Internet from a cellular phone or other handheld wireless. Many of us that surf the Internet from home with a 56 kbps modem think that it is slow and a cell phone only uses 9.6 kbps so WAP has to take the lesser bandwidth into consideration. For this reason, this study proposed a flexible and reliable system to be implemented by using the characteristic of agents "mobile agent" through wireless application protocol for identification of distributed Intruder. The problem appears when the limitation of data transfer when the distributed systems are used (which includes the heterogeneous database) through internet. For this reason the suggested approach will be the solution to the problem of WAP for mobile agent. Approach: The purpose of this study was to present the ability for dispatch mobile agent from a host to carry out operations directly to the remote point of interest, thus agent's scans provide an appropriate response which is faster than a hierarchical IDS that communicates with a central coordinator based elsewhere on the network. Results: The methodology was used in order to understand the mobile agent mechanism and will introduce the distributed computing mechanisms that are intended for large scale distributed systems. Since the distributed security agent models system was built using mobile agent and net, this will develop small applications for data stores, like sequential query language server. The method used the algorithms built refer to each part of the structure and the rules that implemented (users and the security agent system roles). The result was simulating the intended for business roles for both commercial and government modules, which included the solution to the problem and to architecture to be more flexible and reliable. Conclusion/Recommendations: One of main conclusion for the mobile agent used WAP protocol: To make this protocol secure when transmit the messages in the distributed system using agents chrematistics and Interaction with security agent is multi-mode providing hassle-free access to the user. Security agent alerted the users based on their alert rules. This study had new approach and idea in implementation, also presented the ability to dispatch mobile agent from a host to carry out operations directly to the remote point of interest, thus agent's scans provide an appropriate response which is faster than a hierarchical IDS that communicates with a central coordinator based elsewhere on the network.en_US
dc.language.isoenen_US
dc.publisherScience Publicationsen_US
dc.subjectCookies and proxyen_US
dc.subjectGPRSen_US
dc.subjectSecurity in WAPen_US
dc.subjectWAPen_US
dc.subjectGlobal system for mobile communicationsen_US
dc.subjectMobile communication systemsen_US
dc.subjectMobile communication systems -- Security measuresen_US
dc.titleA flexible and reliable architecture for mobile agent securityen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record