Security Considerations in Adaptive Middleware. Ajanta – Mobile Agent’s research project papers ( http://www.cs.umn.edu/Ajanta/publications.html )
Ajanta – Mobile Agent’s research project papers (http://www.cs.umn.edu/Ajanta/publications.html)
H.Spafford and Diego Zamboni, Purdue University - “Intrusion detection using autonomous agents”. (http://www.elsevier.nl/gej-ng/10/15/22/49/30/25/article.pdf)
Sau-Koon Ng “Protecting mobile Agents Against Malicious Hosts”, University of Hong Kong (http://www.informatik.uni-stuttgart.de/ipvr/vs/projekte/mole/security/ngthesis.pdf)
Sander and Tchudin, ICSI/Berkeley
"Protecting mobile Agents Against Malicious Hosts"
Security and Mobile Agents
Why Autonomous Agents?
Do we Need Mobility?
Can it be improved with the mobility? How?
Filters – platform and OS specific entities. Their purpose – extract necessary data providing therefore hardware and OS abstraction layer
Autonomous Agents – in AAFID just dynamically enabled and disabled host specific threads with tight purpose (counting amount of opened connections)
Transceivers – host specific entities responsible for collecting data from agents operating on current host and transferring that data to higher entities
Monitors – entities which get information from different hosts, analyze it and can produce alarm in case of attack
GUI – user interface
Static Data – No access on intermediate hosts
Asymmetrical Encryption using public & private key technology
Agent carries public key of the source host (for encryption) and public keys of all nodes it visits (for integrity)
Static Data – Read only Access on intermediate hosts
Only Integrity can be provided with the method mentioned above
When attacker has complete access to the memory where the code is executed, the protection becomes more difficult and even impossible “theoretically”
How can we made tampering process more difficult?
Consider polynomial function
Let E: R R be an additively and mixed multiplicativelyhomomorphic encryption scheme.
Alice decrypts the result simply by applying E-1 and obtains p(x)