Call For Papers
Contact Us

  Mobile Agent for Monitoring and Evaluation of Security Applications in a Network Environment  
  Authors : Amosa Babalola; Onyeka Ndidi; Olaniyi Busayo; Babafemi Olusola
  Cite as:


Mobile agent paradigm derives from two basic disciplines –artificial intelligence from where the concept of an agent originated and distributed systems that define the notion of code mobility having found applications in several areas. However, the implementation of an agent-based system can be through any client/server technology, it is different from classical client/server systems because there is no clear distinction between a client and a server. The mobile agent technology offers several unique capabilities to address the challenges in this area. The objective of this research is to; design a Mobile Agent System for monitoring and evaluating security applications in a network environment and develop a mobile agent capable of increasing the performance of the mobile agent by reducing the size of the agent and also to develop a mobile agent that will be acceptable to all hosts.


Published In : IJCSN Journal Volume 6, Issue 6

Date of Publication : December 2017

Pages : 826-834

Figures :06

Tables : 02


Amosa Babalola : is a Chief Lecturer at the Federal Polytechnic, Ede, Nigeria Holds a Ph.D. in Computer Science, and he is presently at San Juan de la Cruz, University, San Jose, Costa Rica. His area of specialization includes; Mobile Agents, Health informatics, Databases and Steganography. He has published a number of referred papers at local and international levels.

Onyeka Ndidi : Department of Computer Science, Federal Polytechnic, Ede. Nigeria.

Olaniyi Busayo : Department of Computer Science, Federal Polytechnic, Ede. Nigeria.

Babafemi Olusola : Department of Computer Science, Federal Polytechnic, Ede. Nigeria .


Mobile Agent, Performance, Computer Network, Code Mobility, Security Monitoring

In this research, we have presented how the performance of mobile agent can be increased. The major idea behind the model is to reduce the size of the mobile agent. The model allows the mobile agents to visit all the available places during the migration. During migration, some nodes may refuse the mobile agents because their sizes are large and not acceptable to store them. The model can help in this situation. Two experiments have been performed and according to the result, the model proved its efficiency in reducing the mobile agent size.


[1] S. A. Arekete, “Development of Mobile Agent for Monitoring and Evaluation of User Activities in a Network Environment”, Ph.D. thesis, Department of Computer Science, Federal University of Technology, Akure, Nigeria, 2013. [2] D. Milojicic, “Agent Systems and Applications”. IEEE Concurrency. Vol. 8, Issue 2, 2000, pp. 22-23. [3] S. A. Arekete, O. C. Akinyokun, O. Olabode, and B. K. Alese, “Design of a Mobile Agent for Monitoring Activities of Users”. Computer Engineering and Intelligent Systems. ISSN 2222- 1719, Vol. 4, No 3, 2013, pp. 12-24. [4] L. Allan, and F. Karen, Network Management: A Practical Perspective, Addison Wesley, 1993. [5] B. Jean-Chrysostome, “Characterizing End-to-End Delay and Packet Loss in the Internet,” Journal of High-speed Networks. Available at http://ils.unc.edu/dempsey/186500/bolot.pdf, 1993. [6] K. Lai, and M. Baker, Measuring Link Bandwidths using a Deterministic Model of Packet Delay, ACM SIGCOMM Computer Communication Review, 2000. [7] H. Saito, and T. Cusho, Design and Implementation of a Network Performance Evaluation System through Client Observation, Meiji University, Japan, 2002. [8] B. Troy, Network Performance Evaluation Throughput, Computer Science Department, School of Engineering, California Polytechnic State University, California, 1998, pp. 1-20. Available at; http://www.ee.calpoly.edu/3comproject/seniorprojects/Bennett-Troy.pdf. [9] F. Kamangar, D. Levine, G.V. Zaruba, and N. Chitturi, “Distributed Network Monitoring Using Mobile Agents Paradigm”, Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA’03), Arabnia H.R. and Mun Y. (Eds.), 2003, pp. 951-957. [10] A. A, Imianvan, “Development of a mobile agent for evaluating the use of bandwidth in a computer network.” A Ph.D. thesis in the Department of Computer Science, Federal The university of Technology, Akure, Nigeria, 2008. [11]. O, C. Akinyokun, and A.A. Imianvan, “Mobile Agent System for Computer Network Management.” International Conference on Advances in Engineering and Technology, 2009, pp. 796-808. [12] M. R. Genesereth, and S. P. Ketchpel, Software Agents. In: Communication of the ACM, 37(7), 1994, pp. 48-53. [13] V.R. Olga, K. Vladimir, J. Anupam, F. Tim, and Y. Yelena, "Agents2go: An Infrastructure for Location-Dependent Service Discovery in the Mobile Electronic Commerce Environment": In Proceedings, ACM Mobile Commerce Workshop, 2001. [14] K. Lalana, "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments": Ph.D. thesis, University of Maryland Baltimore, 2004. [15] C. Qiang, and A. Marshall, “Network Management Performance Analysis and Scalability Tests: SNMP vs. COBRA”. IEEE/IFIP Network Operations and Management Symposium, NOMS, South Korea, 2004. [16] S. Yashpal, G. Kapil, and S. Niranjan, “Dimensions and Issues of Mobile Agent Technology”. International Journal of Artificial Intelligence & Applications. Vol. 3, No 5, 2012, pp.51-61. [17] C. Lin, and V. Varadharajan, “Mobile trust: a trust enhanced security architecture for Mobile Agent Systems”. International Journal of Information Security. Vol. 9, Issue 3, 2010, pp.153-178. [18] R. Hassan, and A. Hair, “Towards a New security Architecture of Mobile Agents”. International Journal of Soft Computing and Engineering. Vol. 3, Issue 6, 2014, pp. 55-60. [19] R. Heady, G. Luger, A. Maccabe, and M. Servilla, The architecture of a network Level Intrusion detection system. Technical Report, University of New Mexico, Department of Computer Science, 1990. [20] T. Zhixin, “A mobile Agent-Based Server System for Server Resources Monitoring”. Cybernetics and Information Technologies Vol. 13, No4, 2013, pp. 104-117. [21] L. S. Zeng, and H. Wang, “Generating Automatic Fuzzy System from Relational Database System for Estimating Null values”. Cybernetics and Systems. 40(6), 2009, pp.528-548. [22] L. Yucheng, and L. Yubin, “A Monitoring System Design Program Based on B/S Mode”. Proceedings of 1st International Joint Conference on Intelligent Computation Technology and Automation, China, Changsha, 2010, pp.184-187. [23] A, K. Sharma, A. Mishra, and V. Singh, “An Intelligent Mobile-Agent Based Scalable Network Management Architecture for Large-Scale Enterprise System”. Int., Journal of Computer Networks & Communications, Vol. 4, No 1, 2012, pp.79-95. [24] M. Breugst, and T. Magedanz, “On the usage of Mobile Agent Platforms in Telecommunication Environments”, 5th IS &N Conference, Antwerpen, Belgium, 1998, pp. 25-28. [25] P. Morreale, “Agents on the move, Spectrum”, IEEE, Vol. 35, Issue 4, 1998, pp. 34 –41. [26] OMG, Agent technology, Green Paper, Technical Report ec#2000-03-01, Object Management Group, March 2000. URL: http://www.jamesodell.com/ec2000-08-01.pdf. [27] O. Brousse, J. Guillot, G. Sassatelli, T. Gil, F. Grize, and M. Robert, “Mobile Computing Framework for Pervasive Adaptive Computing Platforms”. International Journal of Distributed Sensor Networks, 2012, pp.1-15. [28] A. Mihailovic, A. Kousaridas, A. Jaron, P. Pangalos, N. Alonistioti, and H. Aghvami, “ SelfManagement for Access Points Coverage Optimization and Mobility Agents Configuration in Future Access Networks”. Wireless Personal Communications. Vol. 72, Issue 1, 2013, pp.343- 374. [29] R, Sedgewick, and K. Wayne, Algorithms. Fourth edition. Addison-Wesley Professional, Massachusetts, 2011. [30] G. Ciobanu, and L. Juravle, “Flexible software architecture and language for Mobile Agents”. Concurrency & Computation: Practice & Experience. Vol.24, Issue 6, 2012, pp. 559-571. [31] R. Boutaba, and J. Xiao, Network Management: State of Art. Edited by B.V. Kluwer. Proceedings of the IFIP17th World Computer Congress – TC6 Stream on Communication Systems: The State of the Art. 2002, pp. 127 – 146. [32] S. William, SNMP, SNMPv2, SNMPv3, and RMON 1 and 2. Addison-Wesley. MA, 1999. [33] R. Pinheiro, A. Poylisher, and H. Caldwell, “Mobile Agents for Aggregation of Network Management Data”. In First International Symposium on Agents and Applications, and Third International Symposium on Mobile Agents, 1999, pp. 130–140. [34] M. Crosbie, and E. Spafford, Defending a Computer System using Autonomous Agents. Computer Science Technical Reports, Paper 1200, 1995, http://docs.lib.prudue.edu/cstech/1200. [35] J. Zhang, “A mobile Agent-based Tool Supporting Web Services Testing”. Wireless personal communications. Vol. 56, Issue 1, 2011, pp.147- 172. [36] Y. El-Gamal, E. Khalid and S. Magdy, “A Comparative Performance Evaluation Model of Mobile Agent Versus Remote Method Invocation for Information Retrieval.” World Academy of Science, Engineering, and Technology, 2007, pp. 286-291. [37] M.A. Tarig, “Increasing Mobile Agent Performance by using Free Areas Mechanism”. Journal of Object Technology, Vol.6, No 4, 2007, pp. 125-140. [38] O.C. Akinyokun, J.B. Ekuewa, and S.A. Arekete, “Development of Agent-based system for monitoring software resources in a network environment”. Artificial Intelligence Research. Vol. 3, No 3, 2014, pp. 62 – 74. [39] B.M.G. Amosa, A.A. Sobowale, T. Adepoju, M.A. Hammed, and N. Onyeka, “An Agent Based System for Monitoring Loan Defaulters in Commercial Banks”. Academic Journal of Science. Vol. 7, No2, 2017, pp. 45-54. [40] J, Osborn, Deep Inside C#: An Interview with Microsoft Chief Architect Anders Hejlsberg. O'Reilly Media, 2000. [41] W. Wylie, Why Microsoft's C# isn't. CNET: CBS Interactive, 2002. [42] M. Torgersen, New features in C# 4.0, Microsoft Press, 2009. [43] N. Hamilton, The A-Z of Programming Languages: C#". Computerworld, 2008. [44] A. Derezinska, Specification of mutation operators Specialized for C# code. ICS Res. Paport 2/05 WUT, 2005. [45] D. Marshall, Programming Microsoft Visual C#: The Language, 2nd Edition. Microsoft Press, 2008. [46] H. Scott, C# for the Dynamic Keyword – Whirlwind Tour around. Net 4, 2010. [47] G.A Aderounmu, A. Adekiigbe, and J.S Iyilade, “An Evaluation of Mobile Agent Paradign”. The Journal Computer Science and its Application. 2004, pp. 107 – 116.