Security Considerations in Adaptive Middleware Security and Mobile Agents Ajanta – Mobile Agent’s research project papers (http://www.cs.umn.edu/Ajanta/publications.html)http://www.cs.umn.edu/Ajanta/publications.html.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

Operating Systems Manage system resources –CPU scheduling –Process management –Memory management –Input/Output device management –Storage device management.
Chapter 19: Network Management Business Data Communications, 5e.
ITIS 6200/ Secure multiparty computation – Alice has x, Bob has y, we want to calculate f(x, y) without disclosing the values – We can only do.
Cloakware Corporation, 260 Hearst Way, Suite 311, Kanata, Ontario, Canada K2L 3H1 Spencer Cheng Trusting DRM Software Presentation.
Protecting Mobile Agents from Malicious Host Nathan Balon.
The Mobile Code Paradigm and Its Security Issues Anthony Chan and Michael Lyu September 27, 1999.
Digital Signatures and Hash Functions. Digital Signatures.
Database Administration and Security Transparencies 1.
1 Advances in Network Security Case Study: Intrusion Detection Max Lakshtanov Comp 529T 7-10.
What Crypto Can Do for You: Solutions in Search of Problems Anna Lysyanskaya Brown University.
Objektorienteret Middleware Presentation 2: Distributed Systems – A brush up, and relations to Middleware, Heterogeneity & Transparency.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
An Integrated Framework for Dependable Revivable Architectures Using Multi-core Processors Weiding Shi, Hsien-Hsin S. Lee, Laura Falk, and Mrinmoy Ghosh.
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA.
March 24, 2003Upadhyaya – IWIA A Tamper-resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors R. Chinchani.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Towards Mobile Cryptography Authors: Tomas Sander Christian F. Tschudin Presented: Xiang Lin.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
B.Ramamurthy9/19/20151 Operating Systems u Bina Ramamurthy CS421.
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
CSC8320. Outline Content from the book Recent Work Future Work.
Distributed Systems: Concepts and Design Chapter 1 Pages
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Copyright © George Coulouris, Jean Dollimore, Tim Kindberg This material is made available for private study and for direct.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Ihr Logo Operating Systems Internals & Design Principles Fifth Edition William Stallings Chapter 2 (Part II) Operating System Overview.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
OPERATING SYSTEM SUPPORT DISTRIBUTED SYSTEMS CHAPTER 6 Lawrence Heyman July 8, 2002.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
Unit 2 Architectural Styles and Case Studies | Website for Students | VTU NOTES | QUESTION PAPERS | NEWS | RESULTS 1.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.
Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000.
Abstract A Structured Approach for Modular Design: A Plug and Play Middleware for Sensory Modules, Actuation Platforms, Task Descriptions and Implementations.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
AUTHORS – X. NIE, D. FENG, J. CHE, X. WANG PRESENTED BY- PREOYATI KHAN KENT STATE UNIVERSITY Design and Implementation of Security Operating System based.
Artificial Intelligence Center,
SelfCon Foil no 1 Variability in Self-Adaptive Systems.
Introduction Why are virtual machines interesting?
Intrusion Detection System
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Private key
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
A Binary Agent Technology for COTS Software Integrity Anant Agarwal Richard Schooler InCert Software.
A Blackboard-Based Learning Intrusion Detection System: A New Approach
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Secure Execution of Computations in Untrusted Hosts S. H. K. Narayanan 1, M.T. Kandemir 1, R.R. Brooks 2 and I. Kolcu 3 1 Embedded Mobile Computing Center.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Mobile Analyzer A Distributed Computing Platform Juho Karppinen Helsinki Institute of Physics Technology Program May 23th, 2002 Mobile.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Towards a High Performance Extensible Grid Architecture Klaus Krauter Muthucumaru Maheswaran {krauter,
Mobile Analyzer Concept M O B I L E A N A L Y Z E R A concept for distributed physics analysis application Mika K äki John White
Outline Introduction Characteristics of intrusion detection systems
pVault Sharing Architecture
International Collaboration Project on Information Security
AGENT OS.
Operating Systems Bina Ramamurthy CSE421 11/27/2018 B.Ramamurthy.
Mobile Agents.
An Introduction to Software Architecture
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Security Considerations in Adaptive Middleware Security and Mobile Agents Ajanta – Mobile Agent’s research project papers ( H.Spafford and Diego Zamboni, Purdue University - “Intrusion detection using autonomous agents”. ( Sau-Koon Ng “Protecting mobile Agents Against Malicious Hosts”, University of Hong Kong ( Sander and Tchudin, ICSI/Berkeley "Protecting mobile Agents Against Malicious Hosts" ( hudinzSzpszSzma-security.pdf/sander98protecting.pdf) hudinzSzpszSzma-security.pdf/sander98protecting.pdf

Implementing Intrusion Detection System as a part of Adaptive middleware layer using autonomous Agent’s technology Security problems related with the Agent’s mobility 1.Agent’s operation in the hostile environment (securing agents against malicious host) 2.Malicious agents activity (securing host against malicious agents) Major Directions of Study

Intrusion Detection System – Major Requirements Adaptability Configurability Minimal system overhead Fault tolerance Subversion resistance Scalability Dynamic reconfiguration Compatibility Graceful degradation of service Why Autonomous Agents? Do we Need Mobility?

Autonomous Agents - Advantages Possibility to add/remove agents to monitor most interesting effects during certain period of time An agent can be configured specifically for the host needs where it runs - this gives possibility to implement wide range of security policies By dynamically enabling/disabling agents we can use system resources only for the tasks needed and therefore minimize system overhead We can enable cross-verification between agents to keep their integrity

With increasing amount of hosts in the system we can dynamically increase amount of agents therefore making IDS scalable If couple of agents are stopped (lets say for maintenance) other can continue working therefore allowing dynamic reconfiguration Agents can run on different platforms (like Windows NT family PCs or Sun servers) providing compatibility of IDS with different platforms If one agent accidentally stops for any reason only operation of couple of those related with it may be affected Autonomous Agents - Advantages

Example of Existing IDS Architecture AAFID Filter Autonomous Agents Autonomous Agents Autonomous Agents Transceiver Monitors GUI Can it be improved with the mobility? How?

AAFID Description Filters – platform and OS specific entities. Their purpose – extract necessary data providing therefore hardware and OS abstraction layer Autonomous Agents – in AAFID just dynamically enabled and disabled host specific threads with tight purpose (counting amount of opened connections) Transceivers – host specific entities responsible for collecting data from agents operating on current host and transferring that data to higher entities Monitors – entities which get information from different hosts, analyze it and can produce alarm in case of attack GUI – user interface

Issues: Confidentiality Integrity Mobile Agent Operation in the Hostile Environment Three types of information to protect: Static information which is not relevant for Agent’s successful operation (No Read Access, No Write Access) Static information to which Agent should have an Access (Read Only) Dynamic information, including Agent’s code (Read and Write Access)

Protection Methods Static Data – No access on intermediate hosts Asymmetrical Encryption using public & private key technology Agent carries public key of the source host (for encryption) and public keys of all nodes it visits (for integrity) Static Data – Read only Access on intermediate hosts Only Integrity can be provided with the method mentioned above Dynamic Data When attacker has complete access to the memory where the code is executed, the protection becomes more difficult and even impossible “theoretically” How can we made tampering process more difficult?

Dynamic Code Protection Methods Special type of Encryption mechanism which leaves code executable Adding noisy code in order to increase Agent’s “Entropy” and hide Agent’s real intention

Mathematical model Problem: Alice has an algorithm to compute f Bob has an input x and should compute f(x) Bob should learn nothing about f Bob should not interact with Alice during the computation of f(x)

Solution: f(x)E(f) (x) P(E(f)) (x)x Alice Bob 1. Alice encrypts f 2.Alice creates a program P(E(f)) which implements E(f) 3.Alice sends P(E(f)) to Bob 4.Bob executes P(E(f)) at x 5.Bob sends P(E(f))(x) to Alice 6.Alice decrypt P(E(f))(x) and obtains f(x)

Some Definitions Lets consider two rings – R, S and function E: R S Let’s call encryption function E - additively homomorphic if there is an efficient algorithm PLUS to compute E(x+y) from E(x) and E(y) - multiplicatively homomorphic if there is an efficient algorithm MULT to compute E(xy) from E(x) and E(y) - mixed multiplicatively homomorphic if there is an efficient algorithm MIXED-MULT to compute E(xy) from E(x) and y

Homomorphic Encryption Scheme Let E: R R be an additively and mixed multiplicatively homomorphic encryption scheme. Consider polynomial function Alice’s operation while creating P(X) for Bob: 1.Replace each coefficient by 2.In all summands replace “multiplication” operation of coefficients by with MIXED-MULT 3.Replace “addition” operation with PLUS 4.Send P to Bob

Homomorphic Encryption Scheme Operations on Bob’s host: 1.Run P on his private input and store a list 2.Produce list of summands by calling MIXED-MULT Note: according to MIXED-MULT definition and properties of E Bob gets for each summand 3.Elements of M are added by calling PLUS As the result Bob gets exactly E(p(x)) 4.Bob sends result back to Alice Alice decrypts the result simply by applying E -1 and obtains p(x)

Protecting the Host against Mobile Code General Steps: Verification Authentication Authorization Execution