To validate the efficiency and scalability of our proposed architecture, we conducted a series of rigorous performance tests within the GNS3 simulation environment. The goal was to prove that the “Scout-Killer” model provides superior security without degrading host performance.
One of the critical requirements was minimal impact on the client nodes. We measured the resource consumption of the LocalAgent over a 24-hour period.
Verification Command: To demonstrate this low overhead, we used pidstat to isolate the Java Agent process:
# Monitor the LocalAgent process every 1 second
pidstat -r -u -p $(pgrep -f LocalAgent) 1 10

We measured the “Time-to-Insight”—the duration from anomaly detection on the Central Server to the receipt of the forensic report from the Scout Agent.
This sub-second response time proves that JADE’s Weak Mobility is significantly faster than establishing new SSH sessions for every command, especially under network load.
We analyzed the network impact of wrapping JADE ACL messages inside the WireGuard VPN tunnel.
| Metric | Plaintext (JADE) | Encrypted (WireGuard) | Overhead |
|---|---|---|---|
| Heartbeat Packet | 450 Bytes | 510 Bytes | +13% |
| Scout Report (1KB) | 1.02 KB | 1.15 KB | +12% |
| Latency (Ping) | 0.4 ms | 0.5 ms | +0.1 ms |
Conclusion: The overhead introduced by WireGuard (~12%) is negligible for modern broadband networks. The slight increase in packet size is a worthy trade-off for the encryption provided by the ChaCha20-Poly1305 cipher.