42

Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Security Approach Applied to Mobile

Agent

IDRISSI Hind

Mohammed V University Morocco

La Rochelle University France

C2 DinardOctober the 11th 2012

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 2: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

1 Introduction

2 Mobile Agent

3 Execution Platform

4 Mobile Agent Security

5 Our security Approach

6 Perspectives and Conclusion

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 3: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Client-Server ModelRemote Evaluation ModelCode-on-Demand ModelMobile Agent Model

The emergence of networks across the world has given riseto distributed applications. These applications require astrong interaction between network entities that share thesame resources and purposes.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 4: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Client-Server ModelRemote Evaluation ModelCode-on-Demand ModelMobile Agent Model

Client-Server Model

disadvantages

network tra�cpermanent connection

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 5: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Client-Server ModelRemote Evaluation ModelCode-on-Demand ModelMobile Agent Model

Remote Evaluation Model

disadvantages

Qualitative feedback is limitedTasks are �xed in advance, and cannot be adjusted foreach participant, or be interview-based

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 6: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Client-Server ModelRemote Evaluation ModelCode-on-Demand ModelMobile Agent Model

Code-on-Demand Model

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 7: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Client-Server ModelRemote Evaluation ModelCode-on-Demand ModelMobile Agent Model

Agent mobile Model

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 8: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

De�nitionPropertiesAdvantages

What's an agent?

An agent may be a physical or virtual entity:

able to move from one site to other in network, with aset of actions to execute and resources to deploy inorder to satisfy and optimize its objectives.

able to act in environment and directly communicatewith other agents.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 9: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

De�nitionPropertiesAdvantages

What's an agent?

An agent may be a physical or virtual entity:

able to move from one site to other in network, with aset of actions to execute and resources to deploy inorder to satisfy and optimize its objectives.

able to act in environment and directly communicatewith other agents.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 10: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

De�nitionPropertiesAdvantages

What's an agent?

An agent may be a physical or virtual entity:

able to move from one site to other in network, with aset of actions to execute and resources to deploy inorder to satisfy and optimize its objectives.

able to act in environment and directly communicatewith other agents.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 11: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

De�nitionPropertiesAdvantages

Properties of Mobile Agent

Autonomous.

Communicating.

Secure.

Adaptable.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 12: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

De�nitionPropertiesAdvantages

Properties of Mobile Agent

Autonomous.

Communicating.

Secure.

Adaptable.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 13: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

De�nitionPropertiesAdvantages

Properties of Mobile Agent

Autonomous.

Communicating.

Secure.

Adaptable.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 14: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

De�nitionPropertiesAdvantages

Properties of Mobile Agent

Autonomous.

Communicating.

Secure.

Adaptable.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 15: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

De�nitionPropertiesAdvantages

Mobility advantages

Reduce the network tra�c.

Be free of network response time.

Reduce communication delays.

Manage the robustness and fault tolerance.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 16: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

De�nitionPropertiesAdvantages

Mobility advantages

Reduce the network tra�c.

Be free of network response time.

Reduce communication delays.

Manage the robustness and fault tolerance.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 17: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

De�nitionPropertiesAdvantages

Mobility advantages

Reduce the network tra�c.

Be free of network response time.

Reduce communication delays.

Manage the robustness and fault tolerance.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 18: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

De�nitionPropertiesAdvantages

Mobility advantages

Reduce the network tra�c.

Be free of network response time.

Reduce communication delays.

Manage the robustness and fault tolerance.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 19: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

De�nitionExamples

Execution platform

The execution environment of mobile agents is aninfrastructure o�ering services of quality and control toensure properly, the execution of mobile agents.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 20: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

De�nitionExamples

Example 1 : Aglet : Agent-Applet

Edited by IBM.Uses JAVA as programming language.Uses serialization for mobility of code and agent status.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 21: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

De�nitionExamples

Example 2 : ARA (Agents for Remote Action)

A platform for mobile agent execution inheterogeneous networks.

Uses Tcl or C/C++ language programming.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 22: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

De�nitionExamples

Example 3 : JADE (Java Agent DEvelopment)

A platform for multi-agent created by the laboratoryTILAB (Italy).

Compliant to FIPA standard.

Implemented in JAVA and uses 3 main components :I DF : Directory FacilitatorI ACC : Agent Communication ChannelI AMS : Agent Management System

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 23: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

De�nitionExamples

Example 3 : JADE (Java Agent DEvelopment)

A platform for multi-agent created by the laboratoryTILAB (Italy).

Compliant to FIPA standard.

Implemented in JAVA and uses 3 main components :I DF : Directory FacilitatorI ACC : Agent Communication ChannelI AMS : Agent Management System

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 24: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

ProblematicSecurity Approach based on HardwareSecurity Approach based on Software

Problematic

Mobile agent migrate from one host to another and can berun on each of them.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 25: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

ProblematicSecurity Approach based on HardwareSecurity Approach based on Software

TPE (Trusted Processing Environment)

The agent is executed only inside the TPE.

Disadvantages :I High cost to the manufacture of TPE.I The execution e�ciency of the agent is reduced.I No ability to run multiple agents in parallel.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 26: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

ProblematicSecurity Approach based on HardwareSecurity Approach based on Software

Smart-card

Subdivide the agent code in some sections that will beencrypted by the public key of the smart-card. Thosesections are replaced by procedural calls to smart-card.

Disadvantages :Analysis and deduction of code features.Black Box attack.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 27: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

ProblematicSecurity Approach based on HardwareSecurity Approach based on Software

Cryptographic Traces

Each site visited generates a trace of agent. This tracecontains line of code executed and external values read bythe agent. Before migration of agent to new destination,the site calculates a hash signed and adds it to the agentwhile moving to the next host.

Disadvantages:

It's a detective method

Quietly expensive for systematic use.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 28: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

ProblematicSecurity Approach based on HardwareSecurity Approach based on Software

Cooperative Agents

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 29: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

ProblematicSecurity Approach based on HardwareSecurity Approach based on Software

Cooperative Agents

The principle is to share information between many agentscalled "clones".

Disadvantages:

Abuse in using network resources for communicationbetween clones.

Protect only data transmitted not totally the agent.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 30: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Basic SituationAuthenticationCon�dentiality and MobilityParticular situation

Basic situation

Each of the two machines has a platform for themanagement of mobile agents (JADE).

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 31: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Basic SituationAuthenticationCon�dentiality and MobilityParticular situation

Authentication

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 32: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Basic SituationAuthenticationCon�dentiality and MobilityParticular situation

Con�dentiality and Mobility

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 33: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Basic SituationAuthenticationCon�dentiality and MobilityParticular situation

Con�dentiality and Mobility

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 34: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Basic SituationAuthenticationCon�dentiality and MobilityParticular situation

Con�dentiality and Mobility

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 35: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Basic SituationAuthenticationCon�dentiality and MobilityParticular situation

Particular situation

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 36: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Basic SituationAuthenticationCon�dentiality and MobilityParticular situation

Particular situation

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 37: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Basic SituationAuthenticationCon�dentiality and MobilityParticular situation

Particular situation

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 38: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Perspectives

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 39: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Perspectives

Run calculations to estimate execution time of theapproach.

Use of a trusted third part.

WSIG (Web Service Integration Gateway) = WebServices + Mobile Agent.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 40: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Conclusion

In recent years, the size and variety of data accessible innetworks have increased signi�cantly and the need tomanipulate this dynamic resources of information becomescrucial. Therefore, Mobile agent appears in this context.

However, the security problem that faces mobile agent andmakes it vulnerable to attacks and exploitation, reduces itsuse.

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 41: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Thanks for your attention

Any questions ??

IDRISSI Hind Security Approach Applied to Mobile Agent

Page 42: Security Approach Applied to Mobile AgentSecurity Approach Applied to Mobile Agent IDRISSI Hind Mohammed V University Morocco La Rochelle University France ... or be interview-based

IntroductionMobile Agent

Execution platformMobile Agent SecurityOur Security Approach

Perspectives and Conclusion

Bibliography

Jacques Ferber, " Les systèmes multi - agents : versune intelligence collective", InterEditions, Paris, 1995.

Foundation for Intelligent Physical Agents, Geneve,Suisse, FIPA SL Content Language Speci�cation, 2003.

Agents mobiles et web services pour le Commerceelectronique, Centre de Recherche sur l'InformationScienti�que et Technique (CERIST), DivisionTechnologies des Reseaux d'Information (DTRI),Alger.

Mobile Agents, Niranjan Suri, Institute for Human andMachine Cognition, University of West Florida.

IDRISSI Hind Security Approach Applied to Mobile Agent