Abstract
In an agent’s environment, the most difficult problem to solve is the attack from a platform against the agents. The use of software watermarking techniques is a possible solution to guarantee that the agents are properly executed. In this paper we propose these techniques in an Intrusion Detection System (IDS) based on agents. To achieve this goal, we propose to embed a matrix of marks in each transceiver of the IDS. Moreover, we include obfuscation techniques to difficult a possible code analysis by an unauthorized entity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Nwana, H.S.: Software Agents: An Overview. Knowledge Engineering Review 11(3), 1–40 (1996)
Goyal, B., Sitaraman, S., Krishnamurthy, S.: Intrusion Detection Systems: An overview. SANS Institute 2001, as part of the Information Security Reading Room (2003)
Balasubramaniyan, J.S., Garcia-Fernandez, J.O., Isacoff, D., Spafford, E., Zamboni, D.: An Architecture for Intrusion Detection using Autonomous Agents. In: Proceedings of 14th Annual Computer Security Applications Conference, pp. 13–24 (1998)
Jansen, W., Mell, P., Karygiannis, T., Marks, D.: Mobile Agents in Intrusion Detection and Response. In: Proc. 12th Annual Canadian Information Technology Security Symposium, Ottawa (2000)
Lange, D., Oshima, M.: Programming and deploying java mobile agents with agle. Addison-Wesley, Reading (1998)
Denning, D.E.: An intrusion detection model. IEEE Transactions on Software Engineering 13(2), 222–232 (1987)
Jansen, W.A.: Countermeasures for mobile agent security, Computer communications. Special Issue on Advanced Security Techniques for Network Protection 25(15), 1392–1401 (2002)
Myles, G., Jin, H.: Self-validating branch-based software watermarking. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 342–356. Springer, Heidelberg (2005)
White, J., Niinimäki, M., Niemi, T.: The 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, Japan (2003)
De Santis, A., Persiano, G.: Zero-knowledge proofs of knowledge without interaction Foundations of Computer Science. In: Proceedings of 33rd Annual Symposium, October 24-27, 1992, pp. 427–436 (1992) Digital Object Identifier 10.1109/SFCS.1992.267809
Collberg, C.S., Thomborson, C.: Watermarking, Tamper-Proofing, and Obfuscation – Tools for Software Protection Software Engineering. IEEE transactions 28(8), 735–746 (2002)
Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), October 2003, pp. 290–299 (2003)
Collberg, C., Myles, G.R., Huntwork, A.: Sandmark-A tool for software protection research. Security & Privacy Magazine 1(4), 40–49 (2003)
Páez, R., Satizábal, C., Forné, J.: Cooperative Itinerant Agents (CIA): Security Scheme for Intrusion Detection Systems. In: International Conference on Internet Surveillance and Protection, 2006. ICISP (2006) Digital Object Identifier 10.1109/ICISP.2006.6. ISBN: 0-7695-2649-7
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Páez, R., Tomàs-Buliart, J., Forné, J., Soriano, M. (2008). Securing Agents against Malicious Host in an Intrusion Detection System. In: Lopez, J., Hämmerli, B.M. (eds) Critical Information Infrastructures Security. CRITIS 2007. Lecture Notes in Computer Science, vol 5141. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89173-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-89173-4_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89095-9
Online ISBN: 978-3-540-89173-4
eBook Packages: Computer ScienceComputer Science (R0)