15
PROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

Embed Size (px)

Citation preview

Page 1: P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

PROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS.

By

Olumide Simeon Ogunnusi Shukor Abd Razak

Page 2: P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

TOPICS COVERED: what are mobile agents ?

need for an intrusion detection system for them

Related background

Proposed system architecture

key distribution protocol

Page 3: P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

MOTIVATION

Mobile agents have Great applications

But are vulnerable to intrusions

which in turn causes threat to the network which they operate on.

Great need of an efficient system that prevents intrusions that are targeted through mobile agents.

so that, they are accepted by different networks.

Page 4: P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

WHAT ARE MOBILE AGENTS ?

A mobile agent is an autonomous software agent that has the capability of moving from one host to another with its components .

They can carry data, code and state.

Features. mobile autonomous learning effective for distributed systems

Page 5: P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

NETWORK VULNERABILITIES

A malicious visiting agent can intercept and attack legitimate collaborative agents.

Malicious code can be sent into the network through Mobile Agents.

Types of Attacks Confidentiality Integrity Availability

Page 6: P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

PREVIOUS RESEARCH

Various Cryptography methods were proposed But none provide complete safety from the

possible attacks They limit the functionality of the Agents or do not

protect against the confidentiality, integrity or the availability attacks.

Guan and Huanguo-2010

Cryptographic protocol where behaviour of hosts and agents can be monitored.

Page 7: P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

Malicious Identification Police (MIP) Uses the extended Root Canal algorithm Efficient in integrity protection of agents and

agent platform. Does not protect the confidentiality of agents

components

Carles et al. 2010 Simpler implementation of cryptographic

methods for agent communication.

Srivastava and Nandi (2013) A system where the interaction between the

agents is limited during their execution

Page 8: P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

Woei-Jiunn (2012) Prevents illegal alteration of Agents and Hosts Uses proxy signature and Elliptic curve

cryptographic techniques

Abdelhamid et al. (2007) Protects Agents from malicious hosts. Uses timeouts, and digital signature based

cryptographic methods for secure communications.

Rajeshwar et al. 2012 Protocol for secure routing based on reputation

value and trust value. Uses two agents, one for generating routing table

and second to retrieve securely from non malicious hosts.

Page 9: P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

PROPOSED SYSTEM

Page 10: P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

Agent Server Creates all mobile agents. Requests for the private/public key pairs from CA1 Keeps database of the certificates and private keys

Backup Agent Server Replica of the agent server Ensures uninterrupted availability when the agent server

breaks down

Certification Authority Trusted third party used to authenticate

intercommunication between two or more networks.

Page 11: P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

Security Domain It is the network domain of an agent system. Consists of agent server, backup agent server,

network server, host key store and mobile agents.

Messaging System Messaging system provides facilities for agents’

local and remote communication. It establishes communication links

between collaborating agents

Execution platform It is a host platform or network server platform

appointed by the agent server to coordinate, monitor and supervise the execution and collaboration of cooperating Agents.

Page 12: P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

KEY DISTRIBUTION PROTOCOL

Page 13: P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

ASSUMPTIONS

The two network domains considered in our protocol should use two distinct Certification Authorities

The visiting agent is not having the same mission as the cooperating mobile agents

The network server, execution platform, host platform and the cooperating mobile agents are trusted entities

Page 14: P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

CONCLUSION

This system provides a fault tolerant security protocol for mobile agents.

Two key measures that ensure fault tolerance. Establishment of backup agent server

Dynamic appointment of host Execution platform

Page 15: P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak

Vivek konathala