18
Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Embed Size (px)

Citation preview

Page 1: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Mobile Agent Security

Presented By Sayuri Yonekawa

October 17, 2000

Page 2: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Brief Background of Mobile Agents

It is used currently to refer to everything from robotic systems to e-mail filters to mobile code.

But it do has certain characteristics:They provide an agent server of some kind.Agents can migrate across the internet.Agents can load their code from a variety of

sources.

Page 3: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Brief Background of Mobile Agents (Cont.)

Stationary vs. Mobile

Cooperating vs. isolated

Is a solution for the automation of many tasks in network configuration and management that today must be done by hands.

Page 4: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Problem Description

Mobile agent technologies are going to change way we live and work.

But they also exasperated the internet security problem.

Over a miniscule security hole in a mobile agent system can turn into a gaping flaw in a corporate network.

Page 5: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Danger

Agents can carry virus from host to host.

Agents can be modified by malicious hosts.

Page 6: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Objectives

This project is to test various means of assuring hosts and agents protection.

Determine which are most effective on a given system.

Page 7: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Literature Review

Tschudin, C. F. (1999) discussed many of the security issues related to agents and their host.

Minar, Kramer, and Maes (1999) at MIT Media Lab discussed a way to model a computer system in order to simulate attempted attack and test counter-measures.

Page 8: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

The Importance of The Research

If the security issues on mobile agents can be adequately hand out the benefits software mobility would be great.

Program code could decide on its own where to run and many processes could be automatic and distributed.

Page 9: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Research Design

In order to control as many potential variables as possible, an isolated test system will be set up, allowing us to simulate attacks against hosts and agents, collecting data on the effectiveness of different counter-measures.

Page 10: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Research Design (Cont.)

A strictly controlled model system will allow us to isolate variables to insure the purity of test results care for testing will identify the usefulness and effectiveness of different tools for different types of agents tasks.

Page 11: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Method

Different types of security protection to be tested include.Protections of hosts. Proof-carrying code (like check sum) shipped with

run-time check verification. Authentication, authorization, allocation

authenticate source, verify authorization, allocate only limited resources.

Execution environment-agents run on interpreter, which acts as protective “sandbox.”

Page 12: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Method (Cont.)Protecting agents Extending trusted computing base

Use agents only with trusted hosts-limited.

Detecting agents tampering Good if restoration available, but after the fact

Interlocking Distributing keys and data over multiple agents

Distributed shelter for data Agents replicate to backup data

Clueless agents Agents code incrusted until environmental conditions

meet

Handling in the masses Agents broken up and set in data stream then resembled

Page 13: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Data Analysis

Many trials will be run with only one variable changed and data will be collected and analyzed to determine the most appropriate from of protection for each task or environment, based on effectiveness.

Page 14: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Data Analysis (Cont.)

Ratio data will be collected according to overall percentage of total attacks detected and/or prevented.

Page 15: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Schedule

Stage 1Model design

Stage 2Model construction

Stage 3Run testing

Stage 4Data analysis

Page 16: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Facilities and Special Resources

Several types of computers, networks, hardware, and operating systems will be incorporated into the physical model, to test the agents under a variety of conditions.

Page 17: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000

Conclusion

Agents can provide the software mobility of the future, but will not gain widespread acceptance until security concerns can be safety addressed.

This research will address these concerns, and provide data to help protect both agents and hosts in the real world.

Page 18: Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000