The Mobile Code Paradigm and Its Security Issues Anthony Chan and Michael Lyu September 27, 1999.

Slides:



Advertisements
Similar presentations
A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts Jesús Arturo Pérez Díaz Darío Álvarez Gutiérrez Department of Informatics.
Advertisements

Access Control 1. Given Credit Where It Is Due Most of the lecture notes are based on slides by Dr. Daniel M. Zimmerman at CALTECH Some slides are from.
Understanding Code Mobility
By Olga Gelbart Mobile Agents By Olga Gelbart
Mobile Agents Mouse House Creative Technologies Mike OBrien.
Mobile Code Security Yurii Kuzmin. What is Mobile Code? Term used to describe general-purpose executables that run in remote locations. Web browsers come.
Security Issues in Mobile Code Systems David M.Chess, High Integrity Computing Lab, IBM T.J. Watson Research Center Hawthorne, NY, USA Mobile code systems.
AUTHENTICATION AND KEY DISTRIBUTION
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Mobile Agents Integrity in E-commerce Applications Antonio Corradi, Rebecca Montanari {acorradi, University of Bologna - Italy.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
1 Fault-Tolerance Techniques for Mobile Agent Systems Prepared by: Wong Tsz Yeung Date: 11/5/2001.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
LYU9905 Security in Mobile Agent E- Commerce Systems Prepared by : Wong Ka Ming, Caris Wong Tsz Yeung, Ah Mole Supervisor : LYU Rung Tsong Michael.
1 Authentication Applications Digital Signatures Security Concerns X.509 Authentication Service Kerberos Based on slides by Dr. Lawrie Brown of the Australian.
LYU9905 Security in Mobile Agent E-Commerce Systems Prepared by : Wong Ka Ming, Caris Wong Tsz Yeung, Ah Mole Supervisor :LYU Rung Tsong Michael.
An Integrated Framework for Dependable Revivable Architectures Using Multi-core Processors Weiding Shi, Hsien-Hsin S. Lee, Laura Falk, and Mrinmoy Ghosh.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Design, Implementation, and Experimentation on Mobile Agent Security for Electronic Commerce Applications Anthony H. W. Chan, Caris K. M. Wong, T. Y. Wong,
Security Considerations in Adaptive Middleware Security and Mobile Agents Ajanta – Mobile Agent’s research project papers (
Applied Cryptography for Network Security
LYU9905 Security in Mobile Agent E-Commerce Systems Prepared by : Wong Ka Ming, Caris Wong Tsz Yeung, Ah Mole Supervisor :LYU Rung Tsong Michael Date :
The Mobile Code Paradigm and Its Security Issues Anthony Chan September 13, 1999.
AgentOS: The Agent-based Distributed Operating System for Mobile Networks Salimol Thomas Department of Computer Science Illinois Institute of Technology,
Tcl Agent : A flexible and secure mobile-agent system Paper by Robert S. Gray Dartmouth College Presented by Vipul Sawhney University of Pennsylvania.
Security Modeling and Evaluation for Mobile Agents Anthony Chan and Michael Lyu The Chinese University of Hong Kong.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Client-Server Computing in Mobile Environments
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Secure Remote Access to an Internal Web Server Christian Gilmore, David Kormann, and Aviel D. Rubin ATT Labs - Research “The security policy usually amounts.
Chapter 6 Operating System Support. This chapter describes how middleware is supported by the operating system facilities at the nodes of a distributed.
Mobile Agent Technology for the Management of Distributed Systems - a Case Study Claudia Raibulet& Claudio Demartini Politecnico di Torino, Dipartimento.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Shell Protocols Elly Bornstein Hiral Patel Pranav Patel Priyank Desai Swar Shah.
Data Analysis using Java Mobile Agents Mark Dönszelmann, Information, Process and Technology Group, IT, CERN ATLAS Software Workshop Analysis Tools Meeting,
Source: George Colouris, Jean Dollimore, Tim Kinderberg & Gordon Blair (2012). Distributed Systems: Concepts & Design (5 th Ed.). Essex: Addison-Wesley.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
MOBILE AGENTS What is a software agent ? Definition of an Agent (End-User point of view): An agent is a program that assists people and acts on their behalf.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Karlstad University IP security Ge Zhang
A Distributive Server Alberto Pareja-Lecaros. Introduction Uses of distributive computing - High powered applications - Ever-expanding server so there’s.
Architecture Models. Readings r Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 m Note: All figures from this book.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000.
Agent Based Transaction System CS790: Dr. Bruce Land Sanish Mondkar Sandeep Chakravarty.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Institute for Visualization and Perception Research 1 © Copyright 1999 Haim Levkowitz Java-based mobile agents.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Secure Execution of Computations in Untrusted Hosts S. H. K. Narayanan 1, M.T. Kandemir 1, R.R. Brooks 2 and I. Kolcu 3 1 Embedded Mobile Computing Center.
Enabling Control over Adaptive Program Transformation for Dynamically Evolving Mobile Software Validation Mike Jochen, Anteneh Anteneh, Lori Pollock University.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Chapter 1- Introduction
Information and Network Security
Chapter 9.3 Security Access Control
Anupam Das , Nikita Borisov
Mobile Agents M. L. Liu.
COMP28112 Lecture 2 A few words about parallel computing
Security in SDR & cognitive radio
Cryptography and Network Security
Presentation transcript:

The Mobile Code Paradigm and Its Security Issues Anthony Chan and Michael Lyu September 27, 1999

Presentation Outline Drawbacks of client/server paradigm Classification of mobile code paradigm Mobile code applications and technologies Security concerns of mobile code paradigm Attack model of malicious hosts against mobile agents Possible solutions to protect mobile agents Conclusion

Client/Server Paradigm The most common paradigm being used for distributed application design Two problems: –high network bandwidth requirement (large number of message transfer) –requirement for user-computer interactivity Mobile code emerges as a more efficient alternative

Classification of Mobile Code Ghezzi and Vigna’s classification of mobile code paradigms Know-how: the code to execute Resources: input/output for code execution Processor: abstract machine that holds the state of computation

Mobile Code Applications Examples of mobile code systems: –remote evaluation: rsh utility, SQL queries –code on demand: Java applets –mobile agents: a lot of possible applications, e.g., information retrieval, electronic commerce (bargaining) not common yet, but a lot of platforms for mobile agents being developed worldwide (e.g., Aglets from IBM, Concordia from Mitsubishi) Hurdle: SECURITY

Security Concerns of Mobile Code A basic requirement: –an application developed using the mobile code paradigm can be as secure as the same application developed using the client/server paradigm –otherwise mobile code could not be used for security-critical applications, which are very common –In other words, the mobile code paradigm should not bring additional security attacks that do not have proper security mechanisms to defend

Security Attacks Actions that compromises security requirements of an application Attacks to Client/server: masquerading, forging, eavesdropping, etc. Additional attacks to remote evaluation (REV)/code-on-demand (COD): Trojan horses Additional attacks to mobile agents: agent tampering (data/execution)

Security Mechanisms Mechanisms designed to prevent, detect or recover from security attacks Security mechanisms for client/server: –Kerberos, Secure Socket Layer (SSL), etc. –very well established Security mechanism for REV/COD: –sandboxing and code verification –quite well established Security mechanism for mobile agents: –not established at all!

Mobile Agent Security: A Closer Look Two facets of mobile agent security: –host security protect hosts from malicious agents (code/data) similar to remote evaluation and code on demand approaches –agent security protect agents from malicious hosts a relatively new area in security research

Attack model of malicious hosts against mobile agents (Other agents) Environment Malicious Host Agent System call Read/manipulate properties; control execution Read/manipulate Model proposed by Fritz Hohl: Attacks scenarios that can be described: spy out and modify the whole data part of an agent spy out and modify the code part of an agent manipulate the code execution sequence of an agent manipulate the execution environment of an agent

A mobile agent application Handheld PC (running Windows CE) System analyzes the request and asks the server for data Proxy Server Get the request from client and send agents to database servers Network agent Databases (Oracle server) Agents get appropriate data here and bring back to proxy server CLIENT SERVER A Traveling Information Agent system agent Network

Mobile agent application Advantages of developing the application using mobile agents over conventional client/server: –reduced network traffic for client: client (handheld PC) needs to handle only two network transmissions (agent sending and receiving) –non-interactivity of client: client can be plugged to network, send agent, disconnect from network; then after a while reconnect at another physical location, and receive agent

Attacks to the sample agents Possible attacks to the system described: –a malicious host may spy out and modify data collected by the agent, thus false information is reported to user –a malicious host may spy out the code of the agent, thereby get to learn what information the particular user is interested in –a malicious host may manipulate the execution sequence of the agent, and make the agent request some information for it illegitimately –a malicious host may manipulate the information obtained from the databases, and report false information to the agent

Possible solutions An open research question Two cases: –closed network: malicious hosts are identifiable –open network: malicious hosts are not identifiable

Closed network Integrity checks –integrity check on agent’s result code and data –report to public that host is malicious if integrity check fails –send agents only to those hosts not reported as malicious Encryption –encrypt agent transmission, to avoid eavesdropped by malicious hosts

Closed network Time-limiting techniques –malicious hosts takes time to tamper with / modify agents –limit the time for an agent to survive in the network –do not trust agents and their results that have expire the time limits

Open network Encryption –need to hide the code (algorithm) and data of agents so that any malicious hosts would not be able to tamper –one possible way would be “mobile cryptography” using probabilistic encryption –under active research Time-limiting techniques –limit the time for an agent to survive –security modeling

Security Modeling - some ideas Agent Host 1Host 2Host n … Assume: the time to breach the agent on host i is inversely exponential to the number of instructions carried out by host i the number of instructions carried out by a host is directly proportional to time

Security modeling Let an agent stays at host i for time T i, P(breach at host i) = 1 - exp(- i T i ), i is a constant Then the agent security, i.e., probability of no breach at all host, We may use this to measure the time we allow an agent to stay on a host, so that the agent is still safe up to a certain probability

Conclusion Mobile code as an alternative to client/server for distributed applications Security as a major hurdle to mobile code Mobile code (especially mobile agents) faces more attacks than client/server do, while the corresponding security mechanisms are not well established An application to illustrate attacks to agents Efforts should be devoted to secure agents