Collaborative vs. Mobile Agents

Slides:



Advertisements
Similar presentations
Mobile Agents Mouse House Creative Technologies Mike OBrien.
Advertisements

Distributed Systems Topics What is a Distributed System?
Knowledge Fusion Research Workshop St. Michaels, Maryland October 19-22, 2004 KMCOE Surveillance Imagery Over An Agent-Based Platform Dr. Willie Thompson,
1 Intelligent Agents Software analog to human agents real estate agent, librarian, salesperson Perform tasks individually, or in collaboration Static and.
Distributed Network and System Management Based on Intelligent and Mobile Agents Jianguo Ding 25/03/2002 DVT-DatenVerarbeitungsTechnik FernUniversität.
Software Engineering Techniques for the Development of System of Systems Seminar of “Component Base Software Engineering” course By : Marzieh Khalouzadeh.
Cognitive Radio Networks Breakout GENI Wireless Workshop 28 March 2007.
Mobile Agents for Intrusion Detection Jaromy Ward.
A.M. Florea, Cognitive systems, COST Action IC0801 – WG1, 15 December, Ayia Napa, Cyprus.
Distributed Collaborations Using Network Mobile Agents Anand Tripathi, Tanvir Ahmed, Vineet Kakani and Shremattie Jaman Department of computer science.
Distributed System Concepts and Architectures Summary By Srujana Gorge.
Agent-based E-travel Agency Agent Systems Laboratory Oklahoma State University
Software Agents: An Overview by Hyacinth S. Nwana and Designing Behaviors for Information Agents by Keith Decker, Anandeep Pannu, Katia Sycara and Mike.
SoftCOM 2005: 13 th International Conference on Software, Telecommunications and Computer Networks September 15-17, 2005, Marina Frapa - Split, Croatia.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
INTERNET AND ADHOC SERVICE DISCOVERY BY: NEHA CHAUDHARY.
MagicNET: Security System for Protection of Mobile Agents.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
Mobile Agents For Mobile Computing Department Of Computer Science – Dartmouth College Robert Gray David Kotz Saurab Nog Daniela Rus George Cybenko.
Lecture 24 Wireless Network Security
Digital Libraries1 David Rashty. Digital Libraries2 “A library is an arsenal of liberty” Anonymous.
Agent Based Transaction System CS790: Dr. Bruce Land Sanish Mondkar Sandeep Chakravarty.
D’Agents 1 Presented by Haiying Tan May, 2002 D’Agents: Security in a multiple-language, mobile-agent system Robert S. Gary, David Kotz, George Cybenko,
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Wireless Network Management SANDEEP. Network Management Network management is a service that employs a variety of tools, applications, and devices to.
Company LOGO Network Architecture By Dr. Shadi Masadeh 1.
Fault Tolerant Routing in Mobile Ad hoc Networks Yuan Xue and Klara Nahrstedt Computer Science Department University of Illinois.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
Context-aware Adaptive Routing for Delay Tolerant Networking
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Presented by Edith Ngai MPhil Term 3 Presentation
CIIT-Human Computer Interaction-CSC456-Fall-2015-Mr
Presented by: Saurav Kumar Bengani
Data and database administration
Introduction to Load Balancing:
Supporting Mobile Collaboration with Service-Oriented Mobile Units
Alternatives to Mobile Agents
Access Grid and USAID November 14, 2007
POPULAR POWER Security Issues of Peer-to-Peer Systems
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
CORBA Within the OS & Its Implementation
University of Technology
#01 Client/Server Computing
An Overview of the ITTC Networking & Distributed Systems Laboratory
Dipanjan Chakraborty Anupam Joshi CSEE University of Maryland Baltimore County Anamika: Distributed Service Discovery and Composition Architecture for.
Design and Implementation of Audio/Video Collaboration System Based on Publish/subscribe Event Middleware CTS04 San Diego 19 January 2004 PTLIU Laboratory.
The Extensible Tool-chain for Evaluation of Architectural Models
International Collaboration Project on Information Security
Comparison of LAN, MAN, WAN
Net 431: ADVANCED COMPUTER NETWORKS
Component-Based Software Engineering: Technologies, Development Frameworks, and Quality Assurance Schemes X. Cai, M. R. Lyu, K.F. Wong, R. Ko.
AGENT OS.
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
Large-Scale Mobile-Agent Systems
Mobile Agents M. L. Liu.
Assoc. Prof. Dr. Syed Abdul-Rahman Al-Haddad
An Intelligent Internet Protocol Architecture for Space-Based Networks
A Component-based Architecture for Mobile Information Access
D’Agents: A Mobile-Agent System
Technical Capabilities
Network Architecture By Dr. Shadi Masadeh 1.
AGENT FRAMEWORK By- Arpan Biswas Rahul Gupta.
Sensor Networks – Motes, Smart Spaces, and Beyond
PLANNING A SECURE BASELINE INSTALLATION
Agenda The current Windows XP and Windows XP Desktop situation
#01 Client/Server Computing
Presentation transcript:

Collaborative vs. Mobile Agents Sunday, November 18, 2018 Collaborative vs. Mobile Agents A security overview on both infrastructure and ad-hoc networks Carlisle House 18 November 2018

Overview General agent security risks Collaborative agents and their security risks Mobile agents and their security risks Security comparison Agent behavior in infrastructure and ad-hoc networks Distributed downloading 18 November 2018

General Agent Security Risks Four main security situations Protecting host from agent Protecting agent from other agents Protecting agents from machines Protecting a group of machines from an agent 18 November 2018

General Agent Security Risks Authentication Communication Code tampering / modification 18 November 2018

Collaborative Agents Emphasize autonomy and cooperation Solve large problems with static distributed computing Allow for interconnecting and interoperation of multiple existing legacy systems. Inter-agent coordination still ongoing issue 18 November 2018

Security-based collaborative agent systems Agent mechanisms distributed throughout network nodes Usually have centralized agent server Examples: Cherubim Seraphim 18 November 2018

Collaborative agent security issues Authentication upon network entry Encryption for communication system Transfer of rule set and agent code 18 November 2018

Mobile Agents Computational software processes capable of roaming networks Also autonomous and cooperative Reduced communication costs and limited resources Easier coordination Can be implemented for dynamic distributed computing 18 November 2018

Security-based mobile agent systems Roaming agents assessing host computer security as well as network health Can have multiple mobile agents within network Examples: MAST Aglets 18 November 2018

18 November 2018

Mobile agent security issues Authentication How often? Associate and Disassociate issues Code integrity Communication issues 18 November 2018

Comparison between systems Collaborative Communication issues mainly deal with network protection and integrity Authentication only needed beginning of session Mobile Communication issues deal with code space and OS access Authentication needed more often Agents more exposed to a variety of threats 18 November 2018

Agent system behavior Looked at infrastructure and ad-hoc wireless network topologies Network simulation implemented using Java Observe system behavior on both systems Performance Security 18 November 2018

Collaborative System 64 node systems with centralized server components Modified Cherubim system Components tested Node scanning mechanism (viral and patch) Firewall Communication transfer Dynamic rule sets and patches 18 November 2018

Mobile system 64 node roaming network system with three agents Firewall Viral scanning Patch management Modified Aglets system 18 November 2018

Observed infrastructure behavior Collaborative Less network strain System more “up to date” More tolerant to heterogeneous network system Mobile Higher network utilization System requires more time for security purposes 18 November 2018

Ad-Hoc Observation Collaborative Mobile Requires more complexity Central-based server system somewhat detrimental Mobile Better performance on ad-hoc network No need for complete server system Same amount of network utilization 18 November 2018

Distributed downloading Attempt to improve efficiency Similar to p2p systems Modify both mobile and collaborative viral definition and patch delivery systems Hope to decrease set up time 18 November 2018

Distributed outcome Collaborative Mobile Less complex to implement Performance increase Infrastrucure – 10% Ad-hoc – 3% Setup time Overall setup time decreased by 12% Mobile More complex Performance increase Infrastructure – 5% Ad-hoc – 4% Setup time Overall setup time decreased by 3% 18 November 2018

Conclusions Collaborative agents have less security risks when compared to mobile agents Collaborative agents better suited for use with infrastructure networks Collaborative agents utilized distributed downloading better than mobile agents Mobile agents perfect for ad-hoc networks 18 November 2018

References Abdalla, Michel. Cirne, Walfredo. Franklin, Leslie. Tabbara, Abdallah. “Security Issues in Agent Based Computing.” In 15th Brazilian Symposium on Computer Networks, Sao Carlos, Brazil, May 1997. Domel, Peter. “Mobile Telescript Agents and the Web.” Proceedings of the 4th Annual Tcl/Tk Workshop, 1996. Gray, Robert. Kotz, David. Nog, Saurab. Rus, Daniela. Cybenko, George. “Mobile Agents for Mobile Computing.” In Technical Report PCS-TR96-285, May 1996. Gray, D. Kotz, G. Cybenko, and D. Rus, "D'Agents: Security in a Multiple Language Mobile-agent System ", Mobile Agents and Security, Lecture Notes in Computer Science, No. 1419, pages 154-187, Springer-Verlag, 1998. Jansen, Wayne. “Countermeasures for Mobile Agent Security.” Computer Communications, Special Issue on Advances in Research and Application and Network Security, Summer 2000. Kotz, David. Gray, Robert. Rue, Daniela.  “Future Directions for Mobile Agent Research.” DS Online, 2002. Kramer, Kwindla Hultman. Minar, Nelson. Maes, Pattie. “Tutorial: Mobile Software Agents for Dynamic Routing.” Mobile Computing and Communications Review, Vol. 3, No. 2, pp 12-16, 1999. 18 November 2018

References Liu, Zhaoyu. Prasad Naldurg, Seung Yi. Tin Qian. Roy H. Campbell. M. Dennis Mickunas. “An Agent Based Architecture for Supporting Application Level Security.” In the DARPA Information Survivability Conference and Exposition, Hilton Head Island, SC, January 2000. Nwana, Hyacinth. “Software Agents: An Overview.” Knowledge Engineering Review, Vol. II, No 3, pp 1-40, September 1996. Pashalidis, A. Fleury, M “Secure Network Management within an Open-source Mobile Agent Framework.” JNSM: Vol. 12, No. 1, 2004. Rus, Daniela. Gray, Robert. Kotz, David. “Transportable Information Agents.” Technical Report: PCSTR96 -278, Department of Computer Science, Dartmouth College, 1996. Sultanik E, Artz D, Anderson G, Kam M, Regli W, Peysakhov M, Sevy J, Belov N, Morizio N, and Mroczkowski A. "Secure mobile agents on ad hoc wireless networks." in The 15th Innovative Applications of Artificial Intelligence Conference, American Association for Artificial Intelligence, 2003. Tripathi, Anand. Koka, Muralidhar. Karanth, Sandeep. Osipkov, Ivan. Talkad, Harsha. Ahmed, Tanvir. Johnson, David. Dier, Scott. “Robustness and Security in a Mobile-Agent based Network Monitoring System.” In Technical Report TR 04-003, January 2004. 18 November 2018

Questions Thanks for listening. 18 November 2018