Detecting and Proving Manipulation Attacks in Mobile Agent Systems

Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict the use of mobile agents despite its benefits. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. In a previous work, the Mobile Agent Watermarking approach (MAW) was presented as a new attack detection technique based on embedding a fixed watermark into the agent’s code. In this paper, some improvements are introduced in MAW. Instead of a fixed watermark, the origin host embeds a watermark that can change dynamically during execution. In each host, the marked code creates a data container where the watermark will be transferred and the results will be hidden. When the agent returns home, the origin host applies a set of integrity rules that the containers must fulfill. These rules can be inferred from the modifications performed in the agent’s code during the watermark embedding. If a container does not fulfill the rules, this means that the corresponding host is malicious. This paper also presents how these containers can be used as a proof to demonstrate that a manipulation attack has been performed.

[1]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[2]  Robbert van Renesse,et al.  Cryptographic support for fault-tolerant distributed computing , 1996, EW 7.

[3]  Wenfei Fan,et al.  Keys with Upward Wildcards for XML , 2001, DEXA.

[4]  J. C. Byington,et al.  Mobile agents and security , 1998, IEEE Commun. Mag..

[5]  Joan Borrell,et al.  Protecting Mobile Agent Itineraries , 2003, MATA.

[6]  Jose L. Muñoz,et al.  Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts , 2003, ICWE.

[7]  Volker Roth,et al.  Mutual Protection of Co-operating Agents , 2001, Secure Internet Programming.

[8]  San Murugesan Web engineering , 1999, LINK.

[9]  Jose L. Muñoz,et al.  Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts , 2003, MATA.

[10]  Christian S. Collberg,et al.  Software watermarking: models and dynamic embeddings , 1999, POPL '99.

[11]  Jose L. Muñoz,et al.  Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts , 2003, DEXA.

[12]  Jan Vitek,et al.  Secure Internet Programming , 1999 .

[13]  Giovanni Vigna,et al.  Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.

[14]  E. Horlait Mobile Agents for Telecommunication Applications , 2003, Lecture Notes in Computer Science.

[15]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[16]  Bennet S. Yee A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.

[17]  Christian S. Collberg,et al.  A Taxonomy of Obfuscating Transformations , 1997 .