6 CONCLUSIONS 
In this paper, we proposed a new framework based on 
trusted server and developed by IBM platform Aglet 
to prevent security issues over mobile agents. The 
proposed approach evaluated how different types of 
mobile agents can react based on real traces with 
attacks. Our experimental results show that the 
proposal mobile agent needs approximately 4x more 
time than a normal agent to execute its job. This is 
cause of the  Generation of the keys, encryption of 
partial information, verification of destination object 
at each visited host and at last collecting the results 
back to the Mobile Agent from the TS all add up to 
form a big turnaround time. Indeed, we compared the 
execution time for all Mobile Agent cases. As the 
number of nodes to be visited is increased, we notice 
that the turnaround time increases. This is tribute to 
the fact that there are more jobs to be done. 
   In our future work, we will focus on detecting 
flooding attacks over mobile agents. We will propose 
a new framework for the detection of flooding attacks 
by integrating Power Divergence over Sketch data 
structure. The performance of the proposed 
framework is investigated in terms of detection 
probability and false alarm ratio.  
We also intend to provide a method for reducing the 
amount of monitoring data on high speed networks, 
and to analyze the impact of sampling on the 
precision of this divergence measure. 
REFERENCES 
HU, Jiang-Ping, Zhi-Xin LIU, Jin-Huan  WANG,  Lin                                                                                                                                         
WANG, Xiao-Ming HU. "Estimation, Intervention and 
Interaction of Multi-agent Systems." Acta Automatica 
Sinica 39, no. 11 (2013): 1796-1804. 
Umar  Manzoor,  Samia  Nefti,  Yacine  Rezgui,                                                                                               
“Categorization of malicious behaviors using ontology-
based cognitive agents”, Data & Knowledge 
Engineering, Volume 85, May 2013, Pages 40-56. 
Umar Manzoor, Samia Nefti, “iDetect: Content Based 
Monitoring of Complex Networks using Mobile 
Agents”, Applied Soft Computing, Volume 12, Issue 5, 
May 2012, Pages 1607-1619. 
Chen, Bo, Harry H. Cheng, and Joe Palen. "Integrating 
mobile agent technology with multi-agent systems for 
distributed traffic detection and management systems." 
Transportation Research Part C: Emerging 
Technologies 17, no. 1 (2009): 1-10. 
Maria Zubair, Umar Manzoor. “Mobile Agent based 
Network Management Applications and Fault-
Tolerance Mechanisms”, The Sixth International 
Conference on Innovative Computing Technology 
(INTECH 2016) 
Mouhammd Alkasassbeh, Mo Add. “Network fault 
detection with Wiener filter-based agent”, Journal of 
Network and Computer Applications 32(4) (4):824-
833 · July 2009 
Talal Rahwan, Tarek Rahwan, Iyad Rahwan, and Ronald 
Ashri. “Agent-based Support for Mobile Users using 
AgentSpeak(L)”, Agent-Oriented Information Systems 
Volume 3030 of the series Lecture Notes in Computer 
Science pp 45-60 
Tu, Griffel and Lamersdof. “Integration of intelligent and 
mobile agent for E-commerce” 
Ryszard Kowalczyk, Mihaela Ulieru and Rainer Unland. 
“Integrating Mobile and Intelligent Agents in 
Advanced e-Commerce: A Survey)”, Agent-Oriented 
Information Systems Volume 3030 of the series Lecture 
Notes in Computer Science pp 45-60 
Jansen W. and Karygiannis “T. Mobile Agent Security”, 
National Institute of Standards and Technology, 
Gaithersburg, MD 220899. 
Rahula Jha, “Mobile Agents for e-commerce”, M. Tech. 
Dissertation, IIT Bombay, India, 2002. 
Altalayleh, M. and Brankovic, L. “An Overview of Security 
Issues and Techniques in Mobile Agents”, University 
of NewCastle, Australia. 
Danny B. Lange, Mitsuru Oshima. “Mobile Agents with 
Java: The Aglet API”, September 1998, Volume 1, 
Issue 3, pp 111–121 
Sun: Java 2 SDK security documentation. (2003). 
Guido J.van 't Noordende, Frances M. T. Brazier, Andrew 
S. Tanenbaum. “Security in a Mobile Agent System”, 
2004, IEEE Symposium on Multi-Agent Security and 
Survivability 
Michelle S. Wangham, Joni da Silva Fraga, Rafael R. 
Obelheiro. “A Security Scheme for Agent Platforms in 
Large-Scale Systems”, 2013, IFIP International 
Conference on Communications and Multimedia 
Security Mobile, pp 104-116 
Gray, R., Kotz, D., Cybenko, G., Rus, “Security in a 
multiplelanguage, mobile agent systems”. LNCS 1419. 
Springer-Verlag (1998) 
Karnik, N. “Security in Mobile Agent Systems”. PhD 
thesis, University of Minnesota (1998)