Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Handling vulnerabilities with mobile agents in order to consider the delay and disruption tolerant characteristic of military networks

: Aurisch, T.; Jacke, A.


Institute of Electrical and Electronics Engineers -IEEE-:
International Conference on Military Communications and Information Systems, ICMCIS 2018 : 22-23 May 2018, Warsaw, Poland
Piscataway, NJ: IEEE, 2018
ISBN: 978-1-5386-4560-4
ISBN: 978-1-5386-4559-8
ISBN: 978-1-5386-4558-1
International Conference on Military Communications and Information Systems (ICMCIS) <2018, Warsaw>
Conference Paper
Fraunhofer FKIE ()

With the development of modern military warfare towards Network Centric Warfare (NCW), small mobile computers or devices that form tactical ad-hoc networks play an important role. These automatically established networks provide soldiers with information necessary to accomplish their mission. It has to be assumed that hostile forces manage to install malware on a mobile device by exploiting software vulnerabilities in order to spy out mission-specific information. Therefore, a vulnerability management in combination with a patch management is a pro-active countermeasure to improve network security. Most of the vulnerability and patch management systems use a Client-Server architecture. In this paper, we discuss the usage of Mobile Agents for this task. Through this approach, it is possible to consider the properties of military ad-hoc networks such as non-permanently existing end-to-end paths.