Académique Documents
Professionnel Documents
Culture Documents
Meaning of Agent
An agent is a computer system that is situated in some
environment, and that is capable of autonomous action in this environment in order to meet its design objectives. Two basic properties of Software Agents : Autonomicity ability to act without direct human intervention. Situatedness Agents tend to be used where the environment is challenging (dynamic, unpredictable and unreliable).
ACTUATORS
Save state Transport saved state to next system Resume execution of saved state
Sunday, April 22, 2012
Evolution
End point in the incremental evolution of mobile
abstractions such as mobile code, mobile objects, mobile processes. Mobile Code transfers (code) Mobile Object transfers (code + data) Mobile Process transfers (code + data + thread state) Mobile Agent transfers (code + data + thread + authority of its owner)
Sunday, April 22, 2012
and owner, its movement history, resource requirements, authentication keys etc. Part of this may be accessible to the agent itself, but the agent must not be able to modify the attributes
Sunday, April 22, 2012
Levels of Mobility
Weak Mobility
When moving a mobile agent carries
beginning
Sunday, April 22, 2012
Levels of Mobility
Strong Mobility
When moving a mobile agent carries
(code + data state + execution state) Data State - global or instance variable Execution State local variables and threads On moving, execution can continue from the point it stopped on the previous host
initialized.
Deactivation: an agent is put to sleep and its state is Activation: a deactivated agent is brought back to life
forever.
Communication: Notifies the agent to handle
messages incoming from other agents , which is the primary means of inter-agent correspondence.
Dispose
Clone
Agent Agent
Dispatch
Agent Retract
Agent Life Cycle -Creation -Cloning Class -Dispatching and File Retraction (Mobility) -Activation and Deactivation (Persistence) -Disposal
Sunday, April 22, 2012
Create
Deactivate
Activate
Disk Storage
Client/Server
Client/Server Discussion
Examples: WWW, RPC, Webservices, CORBA, EJBs Elements
Mobile Agents
Result
Sunday, April 22, 2012
data - semi-mobile (necessary data is mobile) code - mobile program stack mobile
The
Mobile Agent paradigm can solve all distributed computing issues NO! Mobile Agents are not a substitute for clientserver techniques. The two techniques augment each other and very often a combination of the two is the most appropriate.
They reduce network load They overcome network latency They encapsulate protocols They execute asynchronously and autonomously They adapt dynamically They are naturally heterogeneous They are robust and fault-tolerant
There is still no killer app for mobile agents!
Sunday, April 22, 2012
Languages:
The following languages are being used today for authoring agents. Java, Telescript, TCL or Tools Control Language, Obliq, Python
Security Threats
Threats to security generally fall into three main classes:
Disclosure of information
Denial of service
Corruption of information
Network
Agent
platform
Malicious Agents
Malicious agents are those that try to attack the hosting agency or other agent. Classification malicious agents according to the target they attack
Attacking the Hosting Agency. Attacking Other Agents
The most obvious example of a malicious agent is one that consumes resources of the hosting environment in an improper way.
Recourses may be : Memory, CPU cycles, Network bandwidth Effect : The agency eventually is not able to provide its usual
service to other agents.
Sunday, April 22, 2012
Malicious Agencies
A malicious agency is one that tries to attack mobile
agents currently residing on it or other agencies by attacking the communication link. Two types of attack can occur
Passive attack
Traffic analysis
each message is encrypted because it is not important
whether the data is readable(understandable) to the attacker. Here, the adversary attempts to find patterns in the communication between two agencies, which might allow the adversary to derive certain assumptions based on these patterns.
Passive attack
Traffic analysis
A B
Attacker
Sunday, April 22, 2012
Active Attack
Active attacks include security threats in which an
agency tries to manipulate agent code or data while it is transmitted between agencies. The most common examples of this kind of attack are alterations, in which an agents data is deleted or tampered with by an agency
Active attack
Agency A Agency B A B
Malicious Agencies
Example
Platform 4 Malicious host
Platform 2
Agent Migration
Platform 3
Attacking Agents
cut and paste attack
This attack works even if data has been encrypted so that It can be read only at specific agencies.
An agent, , carries a data item protected with the public key of an
agency, Ai that the agent is going to visit. a malicious agency, Am, which currently is hosting agent , could cut the data item, paste it into a new agent, and let this agent migrate to Ai. The new agent decrypts the data item and carries it back to agency Am.
References:
Mobile Agents Basic Concepts, Mobility Models, and the Tracy Toolkit
Peter Braun Swinburne University of Technology, Victoria, Australia Wilhelm Rossak ,Friedrich Schiller University, Jena, Thuringia, Germany.
Mobile agent security Niklas Borselius Mobile VCE Research Group Information Security Group, Royal Holloway, University of London
Artificial Intelligence A Modern Approach by Russell & Norvig, Second Edition, Prentice Hall.
Thank You