Mobile Agent Protection Scheme through Execution Tracing of Agent Code and Status

에이전트 코드와 상태 추적을 통한 이동에이전트의 보호 기법

  • Published : 2003.07.01

Abstract

With the expansion of computer technology the mobility of a mobile agent code having the flexibility in the dispersive computer situation is used to set up the applications distributed on the Internet. As it also has the ability to transmit the mobile code of a mobile agent and to receive it from a far-off host, the executive circumstances of the host system in which an agent is executed have to access to an agent code and the executive state capable of executing an agent code. Therefore, it is difficult to prevent the forgery, the alteration and the wrong execution of an agent from a malicious host. This dissertation suggests the mechanism which can protect an agent from the malicious action through the executive pursuit of a code-named mobile agent. The security of this mechanism is verified through the protective process of a mobile agent in this mechanism.

컴퓨터 기술의 확산과 더불어 분산 컴퓨팅 환경에서 이동에이전트 코드의 이동성은 유연성이 있어 인터넷상에서 분배된 애플리케이션들을 설치하는데 사용되고 있다. 동시에, 이동에이전트의 이동코드를 전송하고 멀리 떨어진 곳의 호스트로부터 수신할 수 있는 능력을 가지고 있어서 에이전트가 실행되는 호스트 시스템의 실행 환경은 에이전트의 코드와 이를 실행할 수 있는 실행 환경에 접근을 해야 함으로 악의적인 행위들로부터 에이전트의 위조, 변조, 잘못된 실행을 방지하기가 매우 어렵다. 따라서 본 논문은 암호화된 에이전트의 코드와 상태 추적을 통하여 여러 악의적인 행위로부터 에이전트를 보호할 수 있도록 하는 메카니즘을 제안한다 제안한 메카니즘을 통해 이동에이전트가 보호되는 과정을 통해서 안전성을 증명하였다.

Keywords

References

  1. Mobile Object Systems: Towards the Programmable Internet, LNCS v.1222 Analyzing Mobile Code Languages G.Cugola;C.Ghezzi;G.P.Picco;G.Vigna
  2. Technical Report, Sun Microsystems The Java Language: An Overview Sun Microsystems
  3. IBM Corp. white paper IBM Aglets Workbanch-Programming Mobile Agents in Java D.B.Lange;D.T.Chang
  4. Proceedings of the Third Workshop on Mobile Object Systems(ECOOP Workshop'97) Protection Mobile Agent through Traceing G.Vigna
  5. Proc. of the CIKM Workshop on Intelligent Information Agents Agent Tcl: A Transportable Agent System R.S.Gray
  6. The Software Agents Telescript Techology:Mobile Agents J.E.White
  7. Proc. of the 19th Conference on Software Engineering(ICSE'97) Designing Distributed Applications with Mobile Code Paradigms A.Carzaninga;G.P.Pico;G.Vigna
  8. Proc. of the First Conference on Emerging Technologies and Applecations in Communications When agents Roam, Who can you trust? J.Ordille
  9. Mobile Agents: Proc. of the 5th International Conference, Number 2240 in LNCS Portable Resource Reification in Java-based Mobile Agent Systems A.Villazon;W.Binder
  10. Proc. of IEEE International Conference on Computer Languages(ICCN'98) Distributed Computations Driven by Resource Consumption Lue Moreau;Christian Queinnec
  11. Proc. of the 5th IEEE Symposium on Computers and Communications:ISCC 2000 Security Requirments for Management Systems using Mobile Agents H.Reiser;G.Vogt
  12. Proc. of the 2nd International Workshop on Security in Mobile Miti-Agent Systems, associated to AAMAS-2002 Extending Execution Tracing for Mobile Code Security H.K.Tan;L.Moreau
  13. Proc. of the 19th National Information Systems Security Conference Security for Mobile Agents: Issues and Requirments W.M.Farmer;J.D.Guttman;V.Swarup
  14. Proc. 20th International Conference on Distributed Computing Systems(ICDCS2000) System Mechanisms for Partial Rollback of Mobile Agent Execution M.Strasser;K.Rothermel
  15. Proc. of the 1998 IEEE Symposium on Security and Privacy Towards Mobile Cryptography T.Sander;C.Tschudin
  16. Mobile Agents and Security v.LNCS1419 Cryptographic traces for Mobile Agents G.Vigna
  17. IBM Technical Disclosure Bulletin 752 IBM Remote Job Entry Facility:Generalize Subsystem Remote Job Entry Facility J.K.Boggs
  18. IEEE Transaction on Software Engineering v.16 no.7 Implementing Remote Evaluation J.W.Stamos(et al.)
  19. Journal of KIMICS v.6 no.7 An Agent System Protection Mechnism for Secure Action of Mobile Agent in Open Network System C.R.Jung(et al.)