Abstract
Creating a secure framework for mobile agents that leverage such an efficient tool’s usage is yet to be found [Farmer WM, Guttman JD, Swarup V (1996) Proceedings of the 19th national information systems security conference, Tardo J, Valente L (1996) Mobile agent security and telescript, IEEE CompCon]. There are some available approaches to prevent agent-to-agent and agent-to-host type attacks; however, host-to-agent type attacks prevention is still at large [Jansen W, Karygiannis T NIST special publication 800-19—Mobile agent security, National Institute of Standards and Technology]. In this paper, we have implemented a framework in which both agents and hosts are protected. The three virtualization techniques (vserver, vmware, and xen) are utilized as host environments to create a secure, scalable, and efficient framework. Three agent platforms (ajanta, aglets, and sage) are installed on these virtual environments and tested for attacks. Along with a trusted server, our framework claims to be a solution to prevent host-to-agent type attacks during execution as well as most of the other types of attacks. As a result, we believe that the convergence of two promising technologies (virtualization and mobile agents) can create cost-effective, robust, reliable, and easy-to-manage frameworks.
Similar content being viewed by others
References
Farmer, W. M., Guttman, J. D., & Swarup, V. (1996). Security for mobile agents: Issues and requirements. In Proceedings of the 19th national information systems security conference.
Tardo, J., & Valente, L. (1996). Mobile agent security and telescript. IEEE CompCon.
Jansen, W., & Karygiannis, T. (1999) NIST special publication 800-19—Mobile Agent Security. National Institute of Standards and Technology
Topaloglu, U., Bayrak, C., & Kanaskar, N. (2005). Secure mobile agent deployment and communication towards autonomous semantic grid. NASA workshop on radical agent concepts, September 20–22, 2005, Goddard SFC, MD.
Ferber, J. (1999). Multi-Agent systems. Addison-Wesley.
Gray, R., Kotz, D., Cybenko, G., & Rus, D. (1998). D’Agents: Security in a multiple-language, mobile-agent system. In G. Vigna (Ed.), Mobile agents and security, vol 1419 of lecture notes in computer science (pp. 154–187). Springer-Verlag.
Kun Y., Xin G., Dayou L. (2000). Security in mobile agent system: Problems and approaches. ACM SIGOPS Operating Systems Review 34(1): 21–28
Hartline, J. (1998). Mobile agents: A survey of fault tolerance and security. University of Washington.
Sau-Koon, Ng (2000). Protecting mobile agents against malicious hosts. Master Thesis, The Chinese University of Hong Kong.
Sander, T., & Tschudin, C. (1998). Protecting mobile agents against Malicious hosts. In G. Vigna (Ed.), Mobile agents and security, vol 1419 of lecture notes in computer science (pp. 44–60). Springer-Verlag.
Gulyás, L., Kovács, L., Micsik, A., Pataky, B., & Zsámboky I. (2000). An overview of mobile software systems. Technical Report, MTA SZTAKI TR-2000-1.
Karnik, N., & Tripathi, A. (2000). A security architecture for mobile agents in Ajanta. 20th IEEE International Conference on Distributed Computing Systems (ICDCS’00) (icdcs, p. 402).
Farmer, W., Guttman, J., & Swarup, V. (1996). Security for mobile agents: Issues and requirements. In Proceedings of the 19th national information systems security conference (pp. 591–597). Baltimore.
Brazier F., Overeinder B., van Steen M., Wijngaards N. (2002). Agent factory: generative migration of mobile agents in heterogeneous environments. Madrid, SAC
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauery, R., Pratt, I., & Warfield, A. (2003). Xen and the art of virtualization. SOSP’03, October 19-22, 2003, Bolton Landing, New York, USA.
VMWare, http://vmware.com, accessed on 4 March 2006.
Intel VT, http://www.intel.com/technology/computing/vptech/, accessed on 23 September 2005.
AMD Pacifica, http://enterprise.amd.com/Enterprise/serverVirtualization.aspx, accessed on 8 November 2005.
Linux vserver: http://linux-vserver.org/, accessed on 10 March 2006.
Coulouris, G., Dollimore, J., & Kindberg, T. (2001). Distributed systems: Concepts and design (3rd edn.). Addison-Wesley.
Bishop M. (2003). Computer security: Art and science. Boston, Addison-Wesley Publishing Co
Ahmad, H., Suguri, H., Ali, A., Malik, S., Mugal, M., Shafiq, M., Tariq, A., & Basharat, A. (2005). Scalable fault tolerant Agent Grooming Environment—SAGE, AAMAS’05, July 25–29, 2005, Utrecht, Netherlands.
Clements, P., Papaioannou, T., & Edwards, J. Aglets: Enabling the virtual enterprise, ME-SELA ’97.
Aglets, http://aglets.sourceforge.net, accessed on 12 October 2005.
Czajkowski, G., & von Eicken, T. (1998). JRes: A resource accounting interface for Java. ACM conference on object oriented languages and systems (OOPSLA). Canada: Vancouver.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Topaloglu, U., Bayrak, C. Secure mobile agent execution in virtual environment. Auton Agent Multi-Agent Syst 16, 1–12 (2008). https://doi.org/10.1007/s10458-007-9018-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10458-007-9018-5