MAIS: MOBILE AGENT INTEGRITY SYSTEM - A Security System to IDS based on Autonomous Agents

Rafael Páez, Joan Tomàs, Jordi Forné, Miquel Soriano

2007

Abstract

Intrusion Detection Systems based on autonomous agents are a promising technology due to their scalability, resilience to failures, independence and reduction of network traffic. However, when used to protect critical systems, the IDS by itself can be the target of malicious attacks. In this paper we propose a security system to verify the integrity of the IDS agents during their execution time, by using software watermarking techniques.

References

  1. B. Goyal, S. Sitaraman, S. Krishnamurthy, 2003. Intrusion Detection Systems: An overview. SANS Institute 2001, as part of the Information Security Reading Room.
  2. J.S Balasubramaniyan, J.O. Garcia-Fernandez, D. Isacoff, E. Spafford, D. Zamboni, 1998. An Architecture for Intrusion Detection using Autonomous Agents, Proceedings., 14th Annual Computer Security Applications Conference, pages 13 - 24
  3. H.S. Nwana, 1996. Software Agents: An Overview, Knowledge Engineering Review, 11(3), pages 1-40
  4. W. Jansen, P. Mell, T. Karygiannis, D. Marks, 2000. Mobile Agents in Intrusion Detection and Response, Proc. 12th Annual Canadian Information Technology Security Symposium, Ottawa.
  5. D. Lange and M. Oshima, 1998. Programming and deploying java mobile agents with agle, (AddisonWesley)
  6. Dorothy E. Denning, 1987. An intrusion detection model, IEEE Transactions on Software Engineering, 13(2), pages 222-232.
  7. W. A. Jansen. Countermeasures for mobile agent security, 2002. Computer communications, Special Issue on Advanced Security Techniques for Network Protection, 25(15), pages 1392-1401
  8. B.S. Yee, 1997. A Sanctuary for Mobile Agents. Technical Report CS97-537, University of California in San Diego.
  9. V. Roth, 1998. Secure Recording of Itineraries Through Cooperating Agents, Proc. of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, France, pages 147-154.
  10. F.B. Schneider, 1997. Towards Fault-Tolerant and Secure Agentry, Proc. 11th International Workshop on Distributed Algorithms, Saarbucken, Germany, pages 1-14.
  11. G. Vigna, 1997. Protecting Mobile Agents Through Tracing, Proceedings of the 3rd ECOOP Workshop on Mobile Object Systems, Jyvälskylä, Finland.
  12. J. Riordan, B. Schneier, 1998. Environmental Key Generation Towards Clueless Agents, Lecture Notes in Computer Science, 1419, pages 14-24.
  13. T. Sander, C. Tschudin, 1998. Protecting Mobile Agents Against Malicious Hosts, Lecture Notes in Computer Science, 1419, pages 44-60.
  14. F. Hohl, 1998. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts, Lecture Notes in Computer Science, 1419, pages 92- 113.
  15. O. Esparza, M. Soriano, J. L. Muñoz, J. Forné, 2003. A protocol for detecting malicious hosts based on limiting the execution time of mobile agents, 8th IEEE Symposium on Computers and Communications. 1, pages 251-256.
  16. Christian Collberg and Clark Thomborson. On the limits of software watermarking.Technical Report 164, August 1998.
  17. Christian Collberg and Clark Thomborson. Software watermarking: Models and dynamic embeddings. In Principles of Programming Languages 1999, POPL'99, San Antonio, TX, January 1999.
  18. Frank Harary and E. Palmer. Graphical enumeration, 1973. Academic Press, New York
Download


Paper Citation


in Harvard Style

Páez R., Tomàs J., Forné J. and Soriano M. (2007). MAIS: MOBILE AGENT INTEGRITY SYSTEM - A Security System to IDS based on Autonomous Agents . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 41-47. DOI: 10.5220/0002120500410047


in Bibtex Style

@conference{secrypt07,
author={Rafael Páez and Joan Tomàs and Jordi Forné and Miquel Soriano},
title={MAIS: MOBILE AGENT INTEGRITY SYSTEM - A Security System to IDS based on Autonomous Agents},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={41-47},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002120500410047},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - MAIS: MOBILE AGENT INTEGRITY SYSTEM - A Security System to IDS based on Autonomous Agents
SN - 978-989-8111-12-8
AU - Páez R.
AU - Tomàs J.
AU - Forné J.
AU - Soriano M.
PY - 2007
SP - 41
EP - 47
DO - 10.5220/0002120500410047