P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.

Slides:



Advertisements
Similar presentations
Security Controls and Systems in E-Commerce
Advertisements

Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Chapter 1 – Introduction
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
Key Management in Cryptography
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
MagicNET: Security Architecture for Discovery and Adoption of Mobile Agents Presented By Mr. Muhammad Awais Shibli.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
COMPUTER SECURITY MIDTERM REVIEW CS161 University of California BerkeleyApril 4, 2012.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Summary of Distributed Computing Security Yifeng Zou Georgia State University
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Agile Survivable Store PIs: Mustaque Ahamad, Douglas M. Blough, Wenke Lee and H.Venkateswaran PhD Students: Prahlad Fogla, Lei Kong, Subbu Lakshmanan,
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Csci5233 computer security & integrity 1 Cryptography: an overview.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Lecture 24 Wireless Network Security
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Ch 13 Trustworthiness Myungchul Kim
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Network Security Celia Li Computer Science and Engineering York University.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
6.033 Quiz3 Review Spring How can we achieve security? Authenticate agent’s identity Verify the integrity of the request Check the agent’s authorization.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
Presented by Edith Ngai MPhil Term 3 Presentation
Cryptography: an overview
Cryptography: an overview
Intrusion Tolerant Architectures
VANET.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Secure Software Confidentiality Integrity Data Security Authentication
Message Digest Cryptographic checksum One-way function Relevance
Mobile Agents.
Cryptography: an overview
Security.
Security in SDR & cognitive radio
Cryptography and Network Security
Presentation transcript:

P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

T OPICS COVERED : what are mobile agents ? need for an intrusion detection system for them Related background Proposed system architecture key distribution protocol

M OTIVATION Mobile agents have Great applications But are vulnerable to intrusions which in turn causes threat to the network which they operate on. Great need of an efficient system that prevents intrusions that are targeted through mobile agents. so that, they are accepted by different networks.

W HAT ARE MOBILE AGENTS ? A mobile agent is an autonomous software agent that has the capability of moving from one host to another with its components. They can carry data, code and state. Features. mobile autonomous learning effective for distributed systems

N ETWORK V ULNERABILITIES A malicious visiting agent can intercept and attack legitimate collaborative agents. Malicious code can be sent into the network through Mobile Agents. Types of Attacks Confidentiality Integrity Availability

P REVIOUS R ESEARCH Various Cryptography methods were proposed But none provide complete safety from the possible attacks They limit the functionality of the Agents or do not protect against the confidentiality, integrity or the availability attacks. Guan and Huanguo-2010 Cryptographic protocol where behaviour of hosts and agents can be monitored.

Malicious Identification Police (MIP) Uses the extended Root Canal algorithm Efficient in integrity protection of agents and agent platform. Does not protect the confidentiality of agents components Carles et al Simpler implementation of cryptographic methods for agent communication. Srivastava and Nandi (2013) A system where the interaction between the agents is limited during their execution

Woei-Jiunn (2012) Prevents illegal alteration of Agents and Hosts Uses proxy signature and Elliptic curve cryptographic techniques Abdelhamid et al. (2007) Protects Agents from malicious hosts. Uses timeouts, and digital signature based cryptographic methods for secure communications. Rajeshwar et al Protocol for secure routing based on reputation value and trust value. Uses two agents, one for generating routing table and second to retrieve securely from non malicious hosts.

P ROPOSED S YSTEM

Agent Server Creates all mobile agents. Requests for the private/public key pairs from CA1 Keeps database of the certificates and private keys Backup Agent Server Replica of the agent server Ensures uninterrupted availability when the agent server breaks down Certification Authority Trusted third party used to authenticate intercommunication between two or more networks.

Security Domain It is the network domain of an agent system. Consists of agent server, backup agent server, network server, host key store and mobile agents. Messaging System Messaging system provides facilities for agents’ local and remote communication. It establishes communication links between collaborating agents Execution platform It is a host platform or network server platform appointed by the agent server to coordinate, monitor and supervise the execution and collaboration of cooperating Agents.

K EY DISTRIBUTION P ROTOCOL

A SSUMPTIONS The two network domains considered in our protocol should use two distinct Certification Authorities The visiting agent is not having the same mission as the cooperating mobile agents The network server, execution platform, host platform and the cooperating mobile agents are trusted entities

C ONCLUSION This system provides a fault tolerant security protocol for mobile agents. Two key measures that ensure fault tolerance. Establishment of backup agent server Dynamic appointment of host Execution platform

Vivek konathala