• Title/Summary/Keyword: Security agents

Search Result 211, Processing Time 0.021 seconds

Addressing Mobile Agent Security through Agent Collaboration

  • Jean, Evens;Jiao, Yu;Hurson, Ali-R.
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.43-53
    • /
    • 2007
  • The use of agent paradigm in today's applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.

A Secure Mobile Agent Transfer Protocol in Mobile Agents Based E-Commerce System (이동 에이전트 기반 저자사걸 시스템에서의 안전한 이동 에이전트 전송 프로토콜)

  • Han, Seung-Wan;Im, Hyeong-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.5S
    • /
    • pp.1657-1665
    • /
    • 2000
  • Mobile agents based e-commerce system has many advantage than traditional e-commerce-information gathering on goods, price settlement and payment, delivery of the goods purchased, and so on. However, due to the security vulnerability that stems from mobile agent's mobility, mobile agents based e-commerce system has additional security problems. Therefore, in order to do e-commerce securely in th system, first of al the security issues on mobile agents must be addressed. It this paper, we propose a mobile agent transfer protocol that provides confidentiality and integrity of mobile agent in transit and mutual authentication for communicating hosts. We further show the security of the protocol against many possible attacks. Also, we suggest the location management mechanism of mobile agents based on the trust center. This mechanism is capable of finding their locations transparently and detecting mobile agent clones.

  • PDF

Correlation between Customer Orientation and Job Stress due to Degree of Emotional Labor on Security Agents (시큐리티 요원의 감정노동 수준에 따른 직무스트레스와 고객지향성의 관계)

  • Kim, Eui-Young;Lee, Jong-Hwan;Cho, Sung-Jin
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.23-35
    • /
    • 2014
  • This study aims to verify the relationship between customer orientation and job stress due to the degree of emotional labor on security agents. Objects of study are from 10 security companies, randomly selected from those registered on the Regional Police Agencies in Daejeon and Chungnam, from November 10th to 20th, 2013; thirty agents from each company, or three-hundred in total, were selected as research subjects by random sampling method. Twenty-five subjects were excluded for poor response contents and/or low reliability. Thus, only 275 subjects were included in actual analysis. The research tool was the questionnaire which was re-composed on the basis of domestic/overseas preliminary studies, while the data was processed through the frequency analysis, the reliability analysis, the confirmatory factor analysis and structure model analysis, using SPSS version 19.0 and AMOS 17.0 statistics package. Through the data analysis following the research methods above, the conclusion was acquired as follows. First, as job stress of security agents decreased, customer orientation increased. Second, the group of security agents with lower level of emotional labor positively affected job stress and customer orientation.

Analysis of the Views on Leisure of Security Agents (시큐리티 요원의 여가관 분석)

  • Kim, Kyong-Sik;Kim, Chan-Sun;Lee, Kwang-Lyeol;Kim, Pyung-Su
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.388-399
    • /
    • 2009
  • This study is to analyze the views on leisure of security agents. As the subject of this study, the security agents holding office in the capital area in 2008 were selected and total 333 samples are drawn among them by using judgement sampling method. The validity of the questionnaire was verified through an expert group meeting. The statistical method is $x^2$ verification(Chi-Square Tests) using SPSSWIN 16.0. Following results are from the methods mentioned above. First, most of the security agents consider leisure as “rest" and they need it for “stress release". About the importance of work and leisure, the security agents mostly think “both work and leisure are important" and they regard leisure as a “very important" matter for an individual. Second, main leisure activities of the security agents are principally “social activities", while the frequency is “2 or 3 times a month", the time is “1-2 hours", and the period is “4-7 years" in general.

A Load Balancing and Security Scheme of Mobile Agents based on the mobile Trust Model (신뢰모델을 기반으로 한 이동 에이전트의 로드밸런싱과 에이전트 보호 기법)

  • Jung, Chang-Ryul;Lee, Sung-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2337-2344
    • /
    • 2013
  • Mobile Agent is an autonomous mobility technology is being applied in various fields. In particular, mobile agents execution in the Internet environment through the safe execution of the security must be guaranteed. Also, agent to run the agent, the agent's workload should be distributed. In this paper, a trust model based on the security mechanism of the agent execution is proposed. Proposed mechanism to ensure safe execution of the agent was not considered in existing relative researches for rational agent workload distribution and load balancing to improve throughput was. The proposed trust-based security mechanisms for agents to go through security analysis proved safe execution of the agent.

Multimodal layer surveillance map based on anomaly detection using multi-agents for smart city security

  • Shin, Hochul;Na, Ki-In;Chang, Jiho;Uhm, Taeyoung
    • ETRI Journal
    • /
    • v.44 no.2
    • /
    • pp.183-193
    • /
    • 2022
  • Smart cities are expected to provide residents with convenience via various agents such as CCTV, delivery robots, security robots, and unmanned shuttles. Environmental data collected by various agents can be used for various purposes, including advertising and security monitoring. This study suggests a surveillance map data framework for efficient and integrated multimodal data representation from multi-agents. The suggested surveillance map is a multilayered global information grid, which is integrated from the multimodal data of each agent. To confirm this, we collected surveillance map data for 4 months, and the behavior patterns of humans and vehicles, distribution changes of elevation, and temperature were analyzed. Moreover, we represent an anomaly detection algorithm based on a surveillance map for security service. A two-stage anomaly detection algorithm for unusual situations was developed. With this, abnormal situations such as unusual crowds and pedestrians, vehicle movement, unusual objects, and temperature change were detected. Because the surveillance map enables efficient and integrated processing of large multimodal data from a multi-agent, the suggested data framework can be used for various applications in the smart city.

A Study on the Physical Training for the Security Agents of the Security Headquaters in the North Korea (북한 호위사령부의 경호요원 체육교육에 관한 연구)

  • Kim, Jung-Hyun
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.45-64
    • /
    • 2004
  • The pivotal emphasis of the physical training for the security agents of the security headquarters in the North Korea is to inspire them with the defense physical training-centered ideology and the war spirit. Their special martial arts is the protectee-centered offensive arts rather than the self-centered arts. It puts emphasis on training black belt-holders in diverse martial arts rather than in a certain martial art. Thus, the physical training for security agents in the South Korea should be also developed into the ways to rear them as black belt-holders in diverse martial arts rather than to foster them as high grade-holders in a certain martial art. And also, professors majoring in security and physical science have to develop jointly the measures to improve the physical and mental agility and the basic physical strength to inspire rapid handling and perseverance, to develop the physical training program to reduce mental and physical stress of security guards, to develop the standard for the examination of physical strength suitable for the body figures of Korean people and the regular evaluation with the standard and to apply traditional folk-games such as the swing and the seesaw to the physical training for security guards.

  • PDF

The Effect of Welfare Benefit System on Organizational Commitment and Job Satisfaction in Security Agents (시큐리티 요원의 복리후생이 조직몰입 및 직무만족에 미치는 영향)

  • Cho, Sung-Jin;Lee, Hyun-Woo;Lee, Jong-Woo
    • Convergence Security Journal
    • /
    • v.14 no.6_2
    • /
    • pp.3-13
    • /
    • 2014
  • The purpose of this research is to establish the effects of the welfare benefits for security agents on the organizational commitment and the job satisfaction. To achieve this purpose, data were collected from 288 security agents of the security companies located in Seoul and Gyeonggi regions using the welfare benefit, organizational commitment, and job satisfaction scale, and the collected data were analyzed using SPSS 18.0 and AMOS 18.0. The conclusion obtained from the results of the analysis is as follows : First, it was the difference in welfare benefits, organizational commitment, job satisfaction, depending on individual characteristics of the security agents. Second, it was found that the cultural support, facilities support, economic support, and life support of welfare benefits had positive effects on the organizational commitment of security agents, and the conclusion that the welfare benefit factors are important to increase the organizational commitment was derived. Third, it was found that the cultural support, facilities support, economic support, and life support of welfare benefits had positive effects on the job satisfaction of security agents, and the conclusion that satisfying the welfare benefits is a way to raise the job satisfaction was derived.

Effects of Emotional Labor on Customer Orientation by Service Career of Security Agents (시큐리티 요원의 근무경력에 따른 감정노동이 고객지향성에 미치는 영향)

  • Kim, Eui-Young;Lee, Jun-Woo;Cho, Sung-Jin
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.269-293
    • /
    • 2013
  • Raising the level of quality of the security industry is an urgent matter. Since security service is provided through direct contact with customers, the security agents' expression of emotion directly influences the evaluation of the security company or their own earnings. So emotion control at customers demand is necessary above all things, and this research established what difference the service career makes in the influence that the security agent's emotional labor exerts on customer orientation, and the results of the analysis are summarized as follows. First, the security agent's emotional labor exerted negative effects on customer orientation. From this, the conclusion that the higher the security agent's emotional labor, the lower the customer orientation, was obtained. Second, the service career showed differences in the effects of the security agent's emotional labor on the customer orientation. In other words, the conclusion that the lower the security agent's service career, the greater effects the emotional labor exerts on the customer orientation, was obtained. In conclusion, in order to raise the level of customer service, systematic education to control the emotional labor of the security agents with low service career is necessary. Particularly, since the emotional labor of new employees is related to the service environment, the improvement of the service environment of the security agents is more important than anything else.

  • PDF

Secure Mobile Agents in eCommerce with Forward-Secure Undetachable Digital Signatures

  • Shi, Yang;Zhao, Qinpei;Liu, Qin
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.573-583
    • /
    • 2015
  • We introduce the idea of a forward-secure undetachable digital signature (FS-UDS) in this paper, which enables mobile agents to generate undetachable digital signatures with forward security of the original signer's signing key. The definition and security notion of an FS-UDS scheme are given. Then, the construction of a concrete FS-UDS scheme is proposed; and the proof of security for the proposed scheme is also provided. In the proposed scheme, mobile agents need not carry the signing key when they generate digital signatures on behalf of the original signer, so the signing key will not be compromised. At the same time, the encrypted function is combined with the original signer's requirement; therefore, misuse of the signing algorithm can be prevented. Furthermore, in the case where a hacker has accessed the signing key of the original signer, he/she is not able to forge a signature for any time period prior to when the key was obtained.