magicnet: security architecture for creation, classification, and validation of trusted mobile...
TRANSCRIPT
![Page 1: MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli](https://reader035.vdocument.in/reader035/viewer/2022062322/56649ec55503460f94bcfe81/html5/thumbnails/1.jpg)
MagicNET: Security Architecture for Creation,
Classification, and Validation of Trusted Mobile Agents
Presented By Mr. Muhammad Awais Shibli
![Page 2: MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli](https://reader035.vdocument.in/reader035/viewer/2022062322/56649ec55503460f94bcfe81/html5/thumbnails/2.jpg)
Presentation Overview 1. Background
2. Mobile Agents
3. System Components
4. Roles in the Proposed System
5. Components of the System
6. Operations of the System
7. Conclusion
![Page 3: MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli](https://reader035.vdocument.in/reader035/viewer/2022062322/56649ec55503460f94bcfe81/html5/thumbnails/3.jpg)
Mobile Agents
Mobile agents are self-contained software modules with additional credentials and accumulated data. They roam a network, moving autonomously from one server to another, perform their designated tasks, and finally, eventually, return to their control station.
![Page 4: MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli](https://reader035.vdocument.in/reader035/viewer/2022062322/56649ec55503460f94bcfe81/html5/thumbnails/4.jpg)
Background
Wider Adoption of Mobile Agents Security Solutions
– Platform– Agent
![Page 5: MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli](https://reader035.vdocument.in/reader035/viewer/2022062322/56649ec55503460f94bcfe81/html5/thumbnails/5.jpg)
Still Problem !!!!
– Experimental envirnoment– Close Envirnoment
![Page 6: MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli](https://reader035.vdocument.in/reader035/viewer/2022062322/56649ec55503460f94bcfe81/html5/thumbnails/6.jpg)
Issues need to address
Creation of mobile agents Specification of classification parameters. Validation procedures. Enforcement of roles and procedures Distribution of agents
![Page 7: MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli](https://reader035.vdocument.in/reader035/viewer/2022062322/56649ec55503460f94bcfe81/html5/thumbnails/7.jpg)
System Components
MagicNET stands for Mobile Agents Intelligent Community Network, has developed at secLab at DSV Department at KTH.
MagicNET provide complete infrastructural and functional component for secure mobile agent research and development.
It provide support to build secure & trusted mobile agents, provide agents repository (agents’ store), Mobile Agents Servers (for their runtime execution), Mobile Agent Control Station, Infrastructural servers.
![Page 8: MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli](https://reader035.vdocument.in/reader035/viewer/2022062322/56649ec55503460f94bcfe81/html5/thumbnails/8.jpg)
![Page 9: MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli](https://reader035.vdocument.in/reader035/viewer/2022062322/56649ec55503460f94bcfe81/html5/thumbnails/9.jpg)
Assurance Levels for Mobile Agents
“Distributed trust management involves proving that an agent has the ability to access some service/resource solely by verifying that its credentials comply with the security policy of the requested service”[4]
![Page 10: MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli](https://reader035.vdocument.in/reader035/viewer/2022062322/56649ec55503460f94bcfe81/html5/thumbnails/10.jpg)
Second Approach
“ . . . trust (or symmetrically, distrust) is a particular level of the subjective probability with which an agent will perform a particular action, both before it can monitor such action (or independently of his capacity to monitor it) and in a context in which it affects its own action”
![Page 11: MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli](https://reader035.vdocument.in/reader035/viewer/2022062322/56649ec55503460f94bcfe81/html5/thumbnails/11.jpg)
Properties andAttributes
Assurance LevelLow Medium High
Creator’s Signature No Yes Sign Validation
Yes Cert Validation
Owner’s Signature
No YesSign Validation
YesCert Validation
Appraiser’s Signature No Yes Sign Validation
Yes Cert Validation
Privileged Authority’s Signature
No YesSign Validation
YesCert Validation
Service Registrar’s Signature
No YesSign Validation
YesCert Validation
Code Encryption No Yes, symmetric keyTriple DES 168 bits key
Yes, symmetric key AES 256 bits key size
RSA Key Size 512 bits 1024 bits 2048 bits
Baggage Encryption No Yes, symmetric key shared with servers
Yes, public key, enveloping
XML based Task Specification
No Yes Yes, signed by Privileged Authority
Role specification No Yes Yes, signed by Privileged Authority
![Page 12: MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli](https://reader035.vdocument.in/reader035/viewer/2022062322/56649ec55503460f94bcfe81/html5/thumbnails/12.jpg)
Roles in the Proposed System
Agent Creator (AC) Privilege Authority.(PA) Service Registrar. (SR) Agent Trust Appraiser(ATA) Agent Owner (AO)
![Page 13: MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli](https://reader035.vdocument.in/reader035/viewer/2022062322/56649ec55503460f94bcfe81/html5/thumbnails/13.jpg)
Components of the System
Global Certificate Management System Agent Factory Global Directory facilitator (UDDI Server)
Management Server.
![Page 14: MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli](https://reader035.vdocument.in/reader035/viewer/2022062322/56649ec55503460f94bcfe81/html5/thumbnails/14.jpg)
Operations of the System
Agent Creation Agent Trust Appraiser Agent Privileges Assignment Agent Services Publishing Agent Adoption
![Page 15: MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli](https://reader035.vdocument.in/reader035/viewer/2022062322/56649ec55503460f94bcfe81/html5/thumbnails/15.jpg)
![Page 16: MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli](https://reader035.vdocument.in/reader035/viewer/2022062322/56649ec55503460f94bcfe81/html5/thumbnails/16.jpg)
Questions ???