Portable Resource Control in Java: Application to Mobile Agent Security

نویسندگان

  • Walter Binder
  • Jarle Hulaas
  • Alex Villazón
چکیده

Prevention of denial-of-service attacks is indispensable for distributed agent systems to execute securely. To implement the required defense mechanisms, it is necessary to have support for resource control, i.e., accounting and limiting the consumption of resources like CPU, memory, and threads. Java is the predominant implementation language for mobile agent systems, even though resource control is a missing feature on standard Java platforms. Moreover, prevailing approaches to resource control in Java require substantial support from native code libraries, which is a serious disadvantage with respect to portability, since it prevents the deployment of applications on large-scale heterogeneous networks. This article describes the model and implementation mechanisms underlying the new resource-aware version of the J-SEAL2 mobile agent kernel. The resource control model is based on a set of requirements, where portability is very significant, as well as a natural integration with the existing programming model. The implementation consists of a combination of Java byte-code rewriting with well-chosen enhancements in the J-SEAL2 kernel. Realization of a resource control system may be prompted by motivations such as the need for application service providers to guarantee a certain quality of service, or to create the support for usage-based billing. In this article the design strategy is however focussed on security, and more specifically on preventing denial-of-service attacks originating from mobile agents running on the platform. Initial performance measurements are also presented, which back our approach.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Risks in Java-based Mobile Code Systems

Java is the predominant language for mobile agent systems, both for implementing mobile agent execution environments and for writing mobile agent applications. This is due to inherent support for code mobility by means of dynamic class loading and separable class name spaces, as well as a number of security properties, such as language safety and access control by means of stack introspection. ...

متن کامل

A Design of local resource access control for mobile agent in PDA

Personal Device Assistance (PDA) devices are becoming popular, and some such devices have extended their capability to run a mobile agent platform. This paper describes a new security mechanism for mobile agent platforms running on PDAs. Our security mechanism is based on PDAgentSecurityManager built upon a Java virtual machine environment and provides dynamic authentication and flexible access...

متن کامل

Monitor and Control of Mobile Agent Applications

Mobile agents raise significant security concerns that have been the focus of several research activities. However, some security-related issues, such as the protection against denial of service attacks and the accounting of agent resource consumption, still need further investigation. Solutions to these problems require monitoring the resource state during agent execution, in order to control ...

متن کامل

Middleware QoS Agents and Native Kernel Schedulers for Adaptive Multimedia Services and Cluster Servers

Emerging operating systems allow user applications ne grain control over their own resource allocations. This provides a promising approach for user applications to meet their timing constraints. In a distributed environment , however, resource allocation decisions must also be made across machine and traditional OS boundaries. As portable and mobile software entities, middleware agents can man...

متن کامل

Portable Resource Control in Java

Preventing abusive resource consumption is indispensable for all kinds of systems that execute untrusted mobile code, such as mobile object systems, extensible web servers, and web browsers. To implement the required defense mechanisms, some support for resource control must be available: accounting and limiting the usage of physical resources like CPU and memory, and of logical resources like ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Electr. Notes Theor. Comput. Sci.

دوره 63  شماره 

صفحات  -

تاریخ انتشار 2001