Skip to main content
Log in

Secure mobile agent execution in virtual environment

  • Published:
Autonomous Agents and Multi-Agent Systems Aims and scope Submit manuscript

Abstract

Creating a secure framework for mobile agents that leverage such an efficient tool’s usage is yet to be found [Farmer WM, Guttman JD, Swarup V (1996) Proceedings of the 19th national information systems security conference, Tardo J, Valente L (1996) Mobile agent security and telescript, IEEE CompCon]. There are some available approaches to prevent agent-to-agent and agent-to-host type attacks; however, host-to-agent type attacks prevention is still at large [Jansen W, Karygiannis T NIST special publication 800-19—Mobile agent security, National Institute of Standards and Technology]. In this paper, we have implemented a framework in which both agents and hosts are protected. The three virtualization techniques (vserver, vmware, and xen) are utilized as host environments to create a secure, scalable, and efficient framework. Three agent platforms (ajanta, aglets, and sage) are installed on these virtual environments and tested for attacks. Along with a trusted server, our framework claims to be a solution to prevent host-to-agent type attacks during execution as well as most of the other types of attacks. As a result, we believe that the convergence of two promising technologies (virtualization and mobile agents) can create cost-effective, robust, reliable, and easy-to-manage frameworks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Farmer, W. M., Guttman, J. D., & Swarup, V. (1996). Security for mobile agents: Issues and requirements. In Proceedings of the 19th national information systems security conference.

  2. Tardo, J., & Valente, L. (1996). Mobile agent security and telescript. IEEE CompCon.

  3. Jansen, W., & Karygiannis, T. (1999) NIST special publication 800-19—Mobile Agent Security. National Institute of Standards and Technology

  4. Topaloglu, U., Bayrak, C., & Kanaskar, N. (2005). Secure mobile agent deployment and communication towards autonomous semantic grid. NASA workshop on radical agent concepts, September 20–22, 2005, Goddard SFC, MD.

  5. Ferber, J. (1999). Multi-Agent systems. Addison-Wesley.

  6. Gray, R., Kotz, D., Cybenko, G., & Rus, D. (1998). D’Agents: Security in a multiple-language, mobile-agent system. In G. Vigna (Ed.), Mobile agents and security, vol 1419 of lecture notes in computer science (pp. 154–187). Springer-Verlag.

  7. Kun Y., Xin G., Dayou L. (2000). Security in mobile agent system: Problems and approaches. ACM SIGOPS Operating Systems Review 34(1): 21–28

    Article  Google Scholar 

  8. Hartline, J. (1998). Mobile agents: A survey of fault tolerance and security. University of Washington.

  9. Sau-Koon, Ng (2000). Protecting mobile agents against malicious hosts. Master Thesis, The Chinese University of Hong Kong.

  10. Sander, T., & Tschudin, C. (1998). Protecting mobile agents against Malicious hosts. In G. Vigna (Ed.), Mobile agents and security, vol 1419 of lecture notes in computer science (pp. 44–60). Springer-Verlag.

  11. Gulyás, L., Kovács, L., Micsik, A., Pataky, B., & Zsámboky I. (2000). An overview of mobile software systems. Technical Report, MTA SZTAKI TR-2000-1.

  12. Karnik, N., & Tripathi, A. (2000). A security architecture for mobile agents in Ajanta. 20th IEEE International Conference on Distributed Computing Systems (ICDCS’00) (icdcs, p. 402).

  13. Farmer, W., Guttman, J., & Swarup, V. (1996). Security for mobile agents: Issues and requirements. In Proceedings of the 19th national information systems security conference (pp. 591–597). Baltimore.

  14. Brazier F., Overeinder B., van Steen M., Wijngaards N. (2002). Agent factory: generative migration of mobile agents in heterogeneous environments. Madrid, SAC

    Google Scholar 

  15. Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauery, R., Pratt, I., & Warfield, A. (2003). Xen and the art of virtualization. SOSP’03, October 19-22, 2003, Bolton Landing, New York, USA.

  16. VMWare, http://vmware.com, accessed on 4 March 2006.

  17. Intel VT, http://www.intel.com/technology/computing/vptech/, accessed on 23 September 2005.

  18. AMD Pacifica, http://enterprise.amd.com/Enterprise/serverVirtualization.aspx, accessed on 8 November 2005.

  19. Linux vserver: http://linux-vserver.org/, accessed on 10 March 2006.

  20. Coulouris, G., Dollimore, J., & Kindberg, T. (2001). Distributed systems: Concepts and design (3rd edn.). Addison-Wesley.

  21. Bishop M. (2003). Computer security: Art and science. Boston, Addison-Wesley Publishing Co

    Google Scholar 

  22. Ahmad, H., Suguri, H., Ali, A., Malik, S., Mugal, M., Shafiq, M., Tariq, A., & Basharat, A. (2005). Scalable fault tolerant Agent Grooming Environment—SAGE, AAMAS’05, July 25–29, 2005, Utrecht, Netherlands.

  23. Clements, P., Papaioannou, T., & Edwards, J. Aglets: Enabling the virtual enterprise, ME-SELA ’97.

  24. Aglets, http://aglets.sourceforge.net, accessed on 12 October 2005.

  25. Czajkowski, G., & von Eicken, T. (1998). JRes: A resource accounting interface for Java. ACM conference on object oriented languages and systems (OOPSLA). Canada: Vancouver.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Bayrak.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Topaloglu, U., Bayrak, C. Secure mobile agent execution in virtual environment. Auton Agent Multi-Agent Syst 16, 1–12 (2008). https://doi.org/10.1007/s10458-007-9018-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10458-007-9018-5

Keywords

Navigation