why protection against viruses bots and worms is so hard
play

Why Protection against Viruses, Bots, and Worms is so hard Malware - PowerPoint PPT Presentation

Foundations Security in MAS Conclusion Why Protection against Viruses, Bots, and Worms is so hard Malware seen as Mobile Agents Till Drges td@pre-secure.de PRESECURE Consulting GmbH June 20, 2007 Till Drges Protection Malware seen


  1. Foundations Security in MAS Conclusion Why Protection against Viruses, Bots, and Worms is so hard Malware seen as Mobile Agents Till Dörges td@pre-secure.de PRESECURE Consulting GmbH June 20, 2007 Till Dörges Protection – Malware seen as Mobile Agents 1/39

  2. Foundations Security in MAS Conclusion Table of Contents Foundations 1 Agents and Multi Agent Systems Agents and Malware Security in MAS 2 Desirable Properties Protecting the Platform Protecting the Agent Conclusion 3 Till Dörges Protection – Malware seen as Mobile Agents 2/39

  3. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Table of Contents Foundations 1 Agents and Multi Agent Systems Agents and Malware Security in MAS 2 Desirable Properties Protecting the Platform Protecting the Agent Conclusion 3 Till Dörges Protection – Malware seen as Mobile Agents 3/39

  4. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Table of Contents Foundations 1 Agents and Multi Agent Systems Agents and Malware Security in MAS 2 Desirable Properties Protecting the Platform Protecting the Agent Conclusion 3 Till Dörges Protection – Malware seen as Mobile Agents 4/39

  5. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Agents What is an Agent? Till Dörges Protection – Malware seen as Mobile Agents 5/39

  6. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Agents What is an Agent? • Modeling Paradigm • Software Engineering (unlike e.g. objects, . . . ) • Artificial Intelligence Till Dörges Protection – Malware seen as Mobile Agents 5/39

  7. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Agents What is an Agent? • Modeling Paradigm • Software Engineering (unlike e.g. objects, . . . ) • Artificial Intelligence Important Properties • Encapsulation and Modularization • Reactivity • Proactivity • Autonomy • Mobility (not generally required) Till Dörges Protection – Malware seen as Mobile Agents 5/39

  8. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Agents (cont’d) Definition • Subject to quite a bit of debate • Social Behavior • Ability to Adapt • Goal Orientation • . . . • Key properties are safe to assume Particularly Suited for • Distributed and Concurrent Systems • Systems across Multiple Administrative Domains Till Dörges Protection – Malware seen as Mobile Agents 6/39

  9. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Agents (cont’d) Colloquially Speaking • Program/Code and Data • Travel between Platforms • Run on different Platforms Examples • “Shopping Agent” • “Find (buy) a blue Bicycle for not more than EUR 500.” • Inquires at several platforms • Finds best solution • Possibly purchases a bike on behalf of owner/user Till Dörges Protection – Malware seen as Mobile Agents 7/39

  10. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Distinction from Mobile Code Examples for Mobile Code • JAVA applets • ActiveX controls • . . . Mobile Code lacks • Autonomy • Proactivity • Goal Orientation Till Dörges Protection – Malware seen as Mobile Agents 8/39

  11. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Platforms What is a Platform? • Runtime Environment for Agents • Responsible Protection of Agents • Services for Interaction (communication, directory services, . . . ) • Transportation of Agents between Platforms Colloquially Speaking • Application on a Computer Till Dörges Protection – Malware seen as Mobile Agents 9/39

  12. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Multi Agent Systems – MAS What is a MAS? • Technically • n with n > 0 Platforms • m with m > 0 Agents • Infrastructure/Policies • Service Point of View • Shopping Platform • Database Querying • Research • . . . • Multi Agent Application • . . . Till Dörges Protection – Malware seen as Mobile Agents 10/39

  13. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Multi Agent Application? Agent Orientation as Modeling Paradigm • Comparable to Object Orientation • AO development environments readily available • AO application doesn’t have to show agents on the outside Till Dörges Protection – Malware seen as Mobile Agents 11/39

  14. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Table of Contents Foundations 1 Agents and Multi Agent Systems Agents and Malware Security in MAS 2 Desirable Properties Protecting the Platform Protecting the Agent Conclusion 3 Till Dörges Protection – Malware seen as Mobile Agents 12/39

  15. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Malware Definition (Wikipedia) Malware is software designed to infiltrate or damage a computer system without the owner’s informed consent. . . . [The term designates] a variety of forms of hostile, intrusive, or annoying software or program code. Taxonomy • Species • Virus • Bot • Worm • . . . • Distinction blurry Till Dörges Protection – Malware seen as Mobile Agents 13/39

  16. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Malware (cont’d) Properties • Provision of “Services” • Spying • Attacking • Back Doors • . . . • Reactivity • Proactivity • Autonomy • Mobility • Self Replication • Adaption Till Dörges Protection – Malware seen as Mobile Agents 14/39

  17. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Malware (cont’d) Properties • Provision of “Services” • Spying • Attacking • Back Doors • . . . • Reactivity • Proactivity • Autonomy • Mobility • Self Replication • Adaption Till Dörges Protection – Malware seen as Mobile Agents 14/39

  18. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Comparison Malware? • Comparison Malware ⇔ Agents holds Platforms? • Infected Computers provide for Runtime Environment • Other services implemented by Malware directly • Comparison for Infected Computers ⇔ Platforms holds MAS? • Less interesting (1 malware is enough to control 1 computer) • Holds, too. Till Dörges Protection – Malware seen as Mobile Agents 15/39

  19. Foundations Agents and Multi Agent Systems Security in MAS Agents and Malware Conclusion Comparison Malware? • Comparison Malware ⇔ Agents holds Platforms? • Infected Computers provide for Runtime Environment • Other services implemented by Malware directly • Comparison for Infected Computers ⇔ Platforms holds MAS? • Less interesting (1 malware is enough to control 1 computer) • Holds, too. Till Dörges Protection – Malware seen as Mobile Agents 15/39

  20. Foundations Desirable Properties Security in MAS Protecting the Platform Conclusion Protecting the Agent Table of Contents Foundations 1 Agents and Multi Agent Systems Agents and Malware Security in MAS 2 Desirable Properties Protecting the Platform Protecting the Agent Conclusion 3 Till Dörges Protection – Malware seen as Mobile Agents 16/39

  21. Foundations Desirable Properties Security in MAS Protecting the Platform Conclusion Protecting the Agent Table of Contents Foundations 1 Agents and Multi Agent Systems Agents and Malware Security in MAS 2 Desirable Properties Protecting the Platform Protecting the Agent Conclusion 3 Till Dörges Protection – Malware seen as Mobile Agents 17/39

  22. Foundations Desirable Properties Security in MAS Protecting the Platform Conclusion Protecting the Agent Security Conventional Aspects / Definition • Confidentiality • Integrity • Availability Till Dörges Protection – Malware seen as Mobile Agents 18/39

  23. Foundations Desirable Properties Security in MAS Protecting the Platform Conclusion Protecting the Agent Security Conventional Aspects / Definition • Confidentiality • Integrity • Availability Till Dörges Protection – Malware seen as Mobile Agents 18/39

  24. Foundations Desirable Properties Security in MAS Protecting the Platform Conclusion Protecting the Agent Security Conventional Aspects / Definition • Confidentiality • Integrity • Availability Shortcomings • Every System is Special • Definition has to be adapted • What about (for example) • Identity • Trust • . . . Till Dörges Protection – Malware seen as Mobile Agents 18/39

  25. Foundations Desirable Properties Security in MAS Protecting the Platform Conclusion Protecting the Agent Desirable Security Properties in MAS Security for Agents? • Communication • Integrity • Confidentiality • Availability • Non-Repudiation • . . . • Mobility • Agent Execution Different Points of View • Protection of Platforms • Protection of Agents Till Dörges Protection – Malware seen as Mobile Agents 19/39

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend