[Lecture Notes in Computer Science] Web Engineering Volume 2722 || Host Revocation Authority: A Way...

4
Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts Oscar Esparza, Miguel Soriano, Jose L. Mu˜ noz, and Jordi Forn´ e Technical University of Catalonia C/ Jordi Girona 1 i 3, Campus Nord, Mod C3, UPC 08034, Barcelona (Spain) {oscar.esparza, soriano, jose.munoz, jforne}@entel.upc.es Abstract. Mobile agents are software entities that consist of code, data and state, and that can migrate autonomously from host to host execut- ing their code. Despite its benefits, security issues restrict the use of code mobility. The approach that is presented here aids to solve the problem of malicious hosts by using a Trusted Third Party, the Host Revocation Authority. The HoRA controls which are the hosts that acted maliciously in the past. The agent sender must consult the HoRA before sending an agent in order to remove from the agent’s itinerary all the revoked hosts. The HoRA can also revoke a malicious host if the agent sender detects and proves that this malicious host did not act honestly. 1 Introduction Mobile agents can migrate from host to host performing actions autonomously on behalf of a user. Despite their benefits, massive use of mobile agents is restricted by security issues. This paper introduces a new approach that aids to solve the problem of malicious hosts by using a Host Revocation Authority. The HoRA must be considered an independent Trusted Third Party (TTP) in a mobile agent system. The HoRA stores the revoked host identifiers, i.e. the identifiers of those hosts that have proven to be malicious. Before sending an agent, origin hosts must ask to the HoRA if the hosts in the agent’s itinerary have been revoked. All those revoked hosts must be deleted from the agent’s itinerary. An origin host can also try to revoke a host by demonstrating to the HoRA that it acted maliciously. In this sense, detection and proving of attacks are needed [5,1]. The rest of the paper is organized as follows: Section 2 presents some pub- lished approaches to solve the problem of the malicious hosts; Section 3 details how the HoRA works and finally, some conclusions can be found in Section 4. 2 Malicious Hosts The problem of malicious hosts is by far the most difficult to solve regarding mobile agent security. Malicious hosts could try to get some profit of the agent modifying the code, the data, the communications or even the results due to their complete control on the execution. Current approaches can be divided in two categories: attack detection and attack avoidance. J.M. Cueva Lovelle et al. (Eds.): ICWE 2003, LNCS 2722, pp. 289–292, 2003. c Springer-Verlag Berlin Heidelberg 2003

Transcript of [Lecture Notes in Computer Science] Web Engineering Volume 2722 || Host Revocation Authority: A Way...

Page 1: [Lecture Notes in Computer Science] Web Engineering Volume 2722 || Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts

Host Revocation Authority: A Way ofProtecting Mobile Agents from Malicious Hosts

Oscar Esparza, Miguel Soriano, Jose L. Munoz, and Jordi Forne

Technical University of Catalonia C/ Jordi Girona 1 i 3, Campus Nord, Mod C3,UPC 08034, Barcelona (Spain)

{oscar.esparza, soriano, jose.munoz, jforne}@entel.upc.es

Abstract. Mobile agents are software entities that consist of code, dataand state, and that can migrate autonomously from host to host execut-ing their code. Despite its benefits, security issues restrict the use of codemobility. The approach that is presented here aids to solve the problemof malicious hosts by using a Trusted Third Party, the Host RevocationAuthority. The HoRA controls which are the hosts that acted maliciouslyin the past. The agent sender must consult the HoRA before sending anagent in order to remove from the agent’s itinerary all the revoked hosts.The HoRA can also revoke a malicious host if the agent sender detectsand proves that this malicious host did not act honestly.

1 Introduction

Mobile agents can migrate from host to host performing actions autonomously onbehalf of a user. Despite their benefits, massive use of mobile agents is restrictedby security issues. This paper introduces a new approach that aids to solve theproblem of malicious hosts by using a Host Revocation Authority. The HoRAmust be considered an independent Trusted Third Party (TTP) in a mobile agentsystem. The HoRA stores the revoked host identifiers, i.e. the identifiers of thosehosts that have proven to be malicious. Before sending an agent, origin hostsmust ask to the HoRA if the hosts in the agent’s itinerary have been revoked.All those revoked hosts must be deleted from the agent’s itinerary. An originhost can also try to revoke a host by demonstrating to the HoRA that it actedmaliciously. In this sense, detection and proving of attacks are needed [5,1].

The rest of the paper is organized as follows: Section 2 presents some pub-lished approaches to solve the problem of the malicious hosts; Section 3 detailshow the HoRA works and finally, some conclusions can be found in Section 4.

2 Malicious Hosts

The problem of malicious hosts is by far the most difficult to solve regardingmobile agent security. Malicious hosts could try to get some profit of the agentmodifying the code, the data, the communications or even the results due totheir complete control on the execution. Current approaches can be divided intwo categories: attack detection and attack avoidance.

J.M. Cueva Lovelle et al. (Eds.): ICWE 2003, LNCS 2722, pp. 289–292, 2003.c© Springer-Verlag Berlin Heidelberg 2003

Verwendete Distiller 5.0.x Joboptions
Dieser Report wurde automatisch mit Hilfe der Adobe Acrobat Distiller Erweiterung "Distiller Secrets v1.0.5" der IMPRESSED GmbH erstellt. Sie koennen diese Startup-Datei für die Distiller Versionen 4.0.5 und 5.0.x kostenlos unter http://www.impressed.de herunterladen. ALLGEMEIN ---------------------------------------- Dateioptionen: Kompatibilität: PDF 1.2 Für schnelle Web-Anzeige optimieren: Ja Piktogramme einbetten: Ja Seiten automatisch drehen: Nein Seiten von: 1 Seiten bis: Alle Seiten Bund: Links Auflösung: [ 600 600 ] dpi Papierformat: [ 594.962 841.96 ] Punkt KOMPRIMIERUNG ---------------------------------------- Farbbilder: Downsampling: Ja Berechnungsmethode: Bikubische Neuberechnung Downsample-Auflösung: 150 dpi Downsampling für Bilder über: 225 dpi Komprimieren: Ja Automatische Bestimmung der Komprimierungsart: Ja JPEG-Qualität: Mittel Bitanzahl pro Pixel: Wie Original Bit Graustufenbilder: Downsampling: Ja Berechnungsmethode: Bikubische Neuberechnung Downsample-Auflösung: 150 dpi Downsampling für Bilder über: 225 dpi Komprimieren: Ja Automatische Bestimmung der Komprimierungsart: Ja JPEG-Qualität: Mittel Bitanzahl pro Pixel: Wie Original Bit Schwarzweiß-Bilder: Downsampling: Ja Berechnungsmethode: Bikubische Neuberechnung Downsample-Auflösung: 600 dpi Downsampling für Bilder über: 900 dpi Komprimieren: Ja Komprimierungsart: CCITT CCITT-Gruppe: 4 Graustufen glätten: Nein Text und Vektorgrafiken komprimieren: Ja SCHRIFTEN ---------------------------------------- Alle Schriften einbetten: Ja Untergruppen aller eingebetteten Schriften: Nein Wenn Einbetten fehlschlägt: Warnen und weiter Einbetten: Immer einbetten: [ ] Nie einbetten: [ ] FARBE(N) ---------------------------------------- Farbmanagement: Farbumrechnungsmethode: Alle Farben zu sRGB konvertieren Methode: Standard Arbeitsbereiche: Graustufen ICC-Profil: RGB ICC-Profil: sRGB IEC61966-2.1 CMYK ICC-Profil: U.S. Web Coated (SWOP) v2 Geräteabhängige Daten: Einstellungen für Überdrucken beibehalten: Ja Unterfarbreduktion und Schwarzaufbau beibehalten: Ja Transferfunktionen: Anwenden Rastereinstellungen beibehalten: Ja ERWEITERT ---------------------------------------- Optionen: Prolog/Epilog verwenden: Ja PostScript-Datei darf Einstellungen überschreiben: Ja Level 2 copypage-Semantik beibehalten: Ja Portable Job Ticket in PDF-Datei speichern: Nein Illustrator-Überdruckmodus: Ja Farbverläufe zu weichen Nuancen konvertieren: Nein ASCII-Format: Nein Document Structuring Conventions (DSC): DSC-Kommentare verarbeiten: Nein ANDERE ---------------------------------------- Distiller-Kern Version: 5000 ZIP-Komprimierung verwenden: Ja Optimierungen deaktivieren: Nein Bildspeicher: 524288 Byte Farbbilder glätten: Nein Graustufenbilder glätten: Nein Bilder (< 257 Farben) in indizierten Farbraum konvertieren: Ja sRGB ICC-Profil: sRGB IEC61966-2.1 ENDE DES REPORTS ---------------------------------------- IMPRESSED GmbH Bahrenfelder Chaussee 49 22761 Hamburg, Germany Tel. +49 40 897189-0 Fax +49 40 897189-71 Email: [email protected] Web: www.impressed.de
Adobe Acrobat Distiller 5.0.x Joboption Datei
<< /ColorSettingsFile () /AntiAliasMonoImages false /CannotEmbedFontPolicy /Warning /ParseDSCComments false /DoThumbnails true /CompressPages true /CalRGBProfile (sRGB IEC61966-2.1) /MaxSubsetPct 100 /EncodeColorImages true /GrayImageFilter /DCTEncode /Optimize true /ParseDSCCommentsForDocInfo false /EmitDSCWarnings false /CalGrayProfile () /NeverEmbed [ ] /GrayImageDownsampleThreshold 1.5 /UsePrologue true /GrayImageDict << /QFactor 0.9 /Blend 1 /HSamples [ 2 1 1 2 ] /VSamples [ 2 1 1 2 ] >> /AutoFilterColorImages true /sRGBProfile (sRGB IEC61966-2.1) /ColorImageDepth -1 /PreserveOverprintSettings true /AutoRotatePages /None /UCRandBGInfo /Preserve /EmbedAllFonts true /CompatibilityLevel 1.2 /StartPage 1 /AntiAliasColorImages false /CreateJobTicket false /ConvertImagesToIndexed true /ColorImageDownsampleType /Bicubic /ColorImageDownsampleThreshold 1.5 /MonoImageDownsampleType /Bicubic /DetectBlends false /GrayImageDownsampleType /Bicubic /PreserveEPSInfo false /GrayACSImageDict << /VSamples [ 2 1 1 2 ] /QFactor 0.76 /Blend 1 /HSamples [ 2 1 1 2 ] /ColorTransform 1 >> /ColorACSImageDict << /VSamples [ 2 1 1 2 ] /QFactor 0.76 /Blend 1 /HSamples [ 2 1 1 2 ] /ColorTransform 1 >> /PreserveCopyPage true /EncodeMonoImages true /ColorConversionStrategy /sRGB /PreserveOPIComments false /AntiAliasGrayImages false /GrayImageDepth -1 /ColorImageResolution 150 /EndPage -1 /AutoPositionEPSFiles false /MonoImageDepth -1 /TransferFunctionInfo /Apply /EncodeGrayImages true /DownsampleGrayImages true /DownsampleMonoImages true /DownsampleColorImages true /MonoImageDownsampleThreshold 1.5 /MonoImageDict << /K -1 >> /Binding /Left /CalCMYKProfile (U.S. Web Coated (SWOP) v2) /MonoImageResolution 600 /AutoFilterGrayImages true /AlwaysEmbed [ ] /ImageMemory 524288 /SubsetFonts false /DefaultRenderingIntent /Default /OPM 1 /MonoImageFilter /CCITTFaxEncode /GrayImageResolution 150 /ColorImageFilter /DCTEncode /PreserveHalftoneInfo true /ColorImageDict << /QFactor 0.9 /Blend 1 /HSamples [ 2 1 1 2 ] /VSamples [ 2 1 1 2 ] >> /ASCII85EncodePages false /LockDistillerParams false >> setdistillerparams << /PageSize [ 595.276 841.890 ] /HWResolution [ 600 600 ] >> setpagedevice
Page 2: [Lecture Notes in Computer Science] Web Engineering Volume 2722 || Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts

290 O. Esparza et al.

2.1 Attack Detection Approaches

This approaches need a TTP to punish malicious hosts in case of detection. Thispaper tries to solve this lack by adding the HoRA to the mobile agent system.

In [5], Vigna introduces the idea of cryptographic traces. The running agenttakes traces of instructions that alter the agent’s state due to external variables.If the agent owner wants to verify execution, it asks for the traces and executesthe agent again. If new execution does not agree with the traces, the host ischeating. This approach has various drawbacks: (1) Verification is only performedin case of suspicion, but the way in which a host becomes suspicious is notexplained; (2) Each host must store the traces for an indefinite period of timebecause the origin host can ask for them.

In [1] the authors present a protocol for detecting suspicious hosts by limitingthe execution time of the agent. Each host saves the agent’s arrival and leavingtime. When the agent reaches the origin host, a set of time checks verifies if eachhost in the agent’s itinerary spent more time than expected executing the agent.If so, the host is considered suspicious of malicious behavior.

2.2 Attack Avoidance Approaches

Detection techniques are not useful for services where benefits for tampering amobile agent are greater than the possible punishment in case of detection, so at-tack avoidance techniques might be used. Unfortunately, there are no approachesthat avoid attacks completely.

The environmental key generation [3] makes the agent’s code impossible todecipher until the proper conditions happen on the environment, so previousanalysis from hosts is avoided. The main drawback of this proposal is that hostscan perform a dictionary attack lying about the environment.

The Time Limited Blackbox [2] uses obfuscation as a way to hide the mobileagent’s code and data to a malicious host. Protection is only assured for a periodof time that depends on the computation capacity of the host. The scheme alsoneeds a great amount of resources as the obfuscated code length is substantiallygreater than plain code.

The use of encrypted programs [4] is proposed as the only way to give privacyand integrity to mobile code. Hosts execute the encrypted code directly. Resultsare decrypted when the agent reaches the origin host. The difficulty here is tofind functions that can be executed in an encrypted way.

3 Host Revocation Authority

This paper introduces a new entity in the mobile agent system, the Host Re-vocation Authority. The HoRA controls which hosts have been revoked in themobile agent system, i.e. host that have proven to be malicious. The HoRA mustbe considered an independent TTP like the Certification Authority is consideredin the PKI. The approach that is presented here can be considered neither a de-tection approach nor an avoidance approach, but a combination of them. First

Page 3: [Lecture Notes in Computer Science] Web Engineering Volume 2722 || Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts

Host Revocation Authority: A Way of Protecting Mobile Agents 291

attack performed by a host cannot be avoided, but if the agent sender can provethat the host acted maliciously, this host can be revoked. Therefore, any otherattack from this malicious host can be avoided.

The rest of the section explains the tasks that the HoRA must perform:

3.1 Keeping the Revocation Information

The aim of host revocation is to distinguish the malicious hosts from the honestones. Unfortunately, it is not possible to know if a honest host can turn intomalicious behavior just in the current transaction. However, it is possible toknow if a host acted maliciously in the past. The HoRA knows which hosts havebeen revoked by saving their host identifiers in a list. Host identifiers must beunique in the mobile agent system, for instance IP addresses or DNS names canbe used.

3.2 Revoking Malicious Hosts

Before an origin host starts a host revocation process, one of any existing de-tection and proving approaches must be used. For instance, the cryptographictraces approach [5] is widely known, but it has two major drawbacks: (1) How ahost becomes suspicious and; (2) Each host must store the traces for an indefi-nite period of time. These drawbacks can be solved by using suspicious detectiontechniques [1]. Using jointly both mechanisms it is possible to detect suspicioushosts and to ask for the traces just when the agent returns to the origin host.

If there is a way to have proofs that demonstrate that a host did not executean agent properly, the origin host can start the revocation process by sending tothe HoRA this proofs. The HoRA receives the proofs and verifies the executionintegrity. If finally the proofs are considered valid, the HoRA adds the malicioushost’s identifier in the list of revoked hosts.

The rest of the tasks depends on the revocation policy. Assuming that theHoRA works in a similar way as the Certification Authority regarding certificaterevocation, two possible revocation policies can be followed.

3.3 Offline Revocation Policy: Generating the HRL

The off-line revocation policy is based on the distribution of revocation informa-tion using a Host Revocation List (HRL), i.e. a list of revoked host identifierssigned by the HoRA. Origin hosts must download a copy of the HRL in orderto consult it before executing an agent. Origin hosts must also update the listperiodically to take into account new malicious hosts. Generating the HRL is aseasy as signing the list that the HoRA has internally. As it is a signed list, it canalso be downloaded from non trusted repositories. In this sense, the HRL worksin a similar way as the Certificate Revocation List in the PKI.

Page 4: [Lecture Notes in Computer Science] Web Engineering Volume 2722 || Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts

292 O. Esparza et al.

3.4 Online Revocation Policy: Receiving and Replying to Requests

The on-line revocation policy is based on asking the revocation information tothe HoRA directly. Before sending a mobile agent, each origin host sends arequest to the HoRA asking for the status of the hosts in the agent’s itinerary.The HoRA consults if these hosts are included in its internal list, and it sendsa signed response to the origin host pointing out which hosts in the agent’sitinerary have been revoked. This mechanism works in a similar way as theOnline Certificate Status Protocol used in the PKI.

3.5 Improvements

The following improvements can be achieved in the HoRA:

– The list that the HoRA has internally grows in an indefinite way. This prob-lem can be solved by using an Agent Execution Certificate, i.e. a certificateissued by the HoRA that permits the hosts to execute agents during a va-lidity period. In this case, the HoRA does not revoke the host identifier, butthe certificate.

– The HoRA must be accessible for all hosts. An alternative topology basedon repositories and a replication policy between entities must be thought.

4 Conclusions

The approach that is presented here aids to solve the problem of malicious hostsby using a TTP, the Host Revocation Authority. The HoRA controls which arethe hosts that acted maliciously in the past. Each agent sender must consultthe HoRA before sending a mobile agent in order to remove from the agent’sitinerary all the revoked hosts. The HoRA can also revoke a malicious host ifthe agent sender proves that this malicious host did not act honestly.

Acknowledgments. This work is supported by the Spanish Research Councilunder the project DISQET CICYT TIC2002-00818.

References

1. O. Esparza, M. Soriano, J.L. Munoz, and J. Forne. Limiting the execution time ina host: a way of protecting mobile agents. In IEEE Sarnoff Symposium ”Advancesin Wired and Wireless Communications”, 2003.

2. F. Hohl. Time Limited Blackbox Security: Protecting Mobile Agents From MaliciousHosts. In Mobile Agents and Security, volume 1419 of LNCS. Springer-Verlag, 1998.

3. J. Riordan and B. Schneier. Environmental Key Generation Towards CluelessAgents. In Mobile Agents and Security, volume 1419 of LNCS. Springer-Verlag,1998.

4. T. Sander and C.F. Tschudin. Protecting mobile agents against malicious hosts. InMobile Agents and Security, volume 1419 of LNCS. Springer-Verlag, 1998.

5. G. Vigna. Cryptographic traces for mobile agents. In Mobile Agents and Security,volume 1419 of LNCS. Springer-Verlag, 1998.