International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248 Volume: 3 Issue: 12 190 – 196 _______________________________________________________________________________________________ 190 IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org _______________________________________________________________________________________ Operability of Mobile Agent Applications in a Protected Environment B. M. G. Amosa, J.B, Ekuewa, O.O. Oyetunji, C. Nwaekpe and T. Ogunleye Department of Computer Science, Federal Polytechnic, Ede. Nigeria amosabmg@gmail.com Abstract - There is a shift toward increasingly heterogeneous networks in today’s communications environment. Such diversity requires that network operators have greater experience and increased training. Managing these diverse networks especially in institutions requires the collection of large quantities of data from a dependable network that must be analyzed before management of any activity can be comenced. In this research, we have identified the operability of mobile Agents in a protected network environment. Keywords - Operability, Agent, Protected Environment, Networks. _____________________________________________*****_____________________________________________ I. INTRODUCTION Managing and monitoring applications in the networks with hundreds of computers has become a challenging and tedious task for today’s system administrators. A general computing infrastructure in a medium to a large organization with many nodes, possibly of different kinds, organized into multiple local-area networks and administrative domains. A mobile agent represents a program capable of migrating from one node to another in a network to perform certain designated tasks [1]. The ability to migrate code and processing functions to a remote node offers the potential benefits of reduced network traffic and bandwidth requirements. This research is motivated by many factors. Many computing environments, such as campus networks, tend to be relatively open. It is the duty of a system administrator to monitor the environment for suspicious activities actively. Large distributed systems require dynamic and scalable architectures for monitoring. Dynamic structures are required to support changes to policies for monitoring, collection, and processing of information at all levels of a system’s organizational hierar chy. It should support the definition of new event types and installation of specific detection mechanisms at specified nodes. It should be possible to install a new monitoring agent at a node, change an existing one, or within a domain, update the current event notification policies to implement new data management structures. It should also be possible to enforce desired security policies for event reporting and processing functions across different administrative domains. For scalability, the infrastructure should support any desired hierarchical and decentralized organization for information collection and processing. Moreover, the system should support the incorporation of new correlation and search functions across different event databases. A computer network is a collection of computers connected and separated by physical distance primarily to search for, share and exchange computer resources. Over the years, monitoring and searching for resources on the network often involved the physical movement of the network administrator from one computer to another [2]. Human administrators of network systems have been used in gathering data for network management. Their work involves monitoring, evaluating and analysis of the various nodes attached to the network or intending to resolve the problems and ensuring optimal performance and efficiency. This function can be tiring, stressful and cumbersome, especially in a large network. A major limitation of the manual approach is that humans cannot monitor events on the network real-time, that is, as the events occur. The network administrator can also be bored and confused about which node to monitor next. It is, therefore, apparent that manual network management cannot efficiently satisfy the requirements of the modern complex network systems. II. NETWORK SECURITY AND MANAGEMENT There exist many contemporary approaches to network security categorized as Host based and Network based. However, they work for Intrusion detection and not for overall security management. As mentioned earlier, Mobile Agents can be useful in such places where we need network security as well as network management. We can use different mobile agents for securing the network from the threats as well as detect the threats. For example, network sniffing detector mobile agent used to find the network sniffer program in the network. Mobile agents can be used in above context as follows: Network load Reducing- Due to the multiple interactions in the network, it creates excess network traffic. A mobile agent through the package conversation they dispatch the packets on