• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Handling vulnerabilities with mobile agents in order to consider the delay and disruption tolerant characteristic of military networks
 
  • Details
  • Full
Options
2018
Conference Paper
Title

Handling vulnerabilities with mobile agents in order to consider the delay and disruption tolerant characteristic of military networks

Abstract
With the development of modern military warfare towards Network Centric Warfare (NCW), small mobile computers or devices that form tactical ad-hoc networks play an important role. These automatically established networks provide soldiers with information necessary to accomplish their mission. It has to be assumed that hostile forces manage to install malware on a mobile device by exploiting software vulnerabilities in order to spy out mission-specific information. Therefore, a vulnerability management in combination with a patch management is a pro-active countermeasure to improve network security. Most of the vulnerability and patch management systems use a Client-Server architecture. In this paper, we discuss the usage of Mobile Agents for this task. Through this approach, it is possible to consider the properties of military ad-hoc networks such as non-permanently existing end-to-end paths.
Author(s)
Aurisch, T.
Jacke, A.
Mainwork
International Conference on Military Communications and Information Systems, ICMCIS 2018  
Conference
International Conference on Military Communications and Information Systems (ICMCIS) 2018  
DOI
10.1109/ICMCIS.2018.8398709
Language
English
Fraunhofer-Institut für Kommunikation, Informationsverarbeitung und Ergonomie FKIE  
  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024