Mobile Agent Computing

Published on February 2017 | Categories: Documents | Downloads: 64 | Comments: 0 | Views: 215
of 7
Download PDF   Embed   Report

Comments

Content

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. 1, January 2011

MOBILE AGENT COMPUTING
MRIGANK RAJYA Software Engineer HCL Technologies Ltd. GURGAON, INDIA [email protected]

ABSTARCT In a broad sense, an agent is any program that acts on behalf of a (human) user. A mobile agent then is a program which represents a user in a computer network, and is capable of migrating autonomously from node to node, to perform some computation on behalf of the user. In computer science, a mobile agent is a composition of computer software and data which is able to migrate (move) from one computer to another autonomously and continue its execution on the destination computer. Mobile Agent, namely, is a type of software agent, with the feature of autonomy, social ability, learning, and most important, mobility. Mobile agent is an agent that migrates from machine to machine in a heterogeneous network at times of its own choosing. An agent is “an independent software program which runs on behalf of a network user”. A mobile agent is a program which, once it is launched by a user, can travel from node to node autonomously, and can continue to function even if the user is disconnected from the network. Examples can be Personal assistant (mail filter, scheduling), Information agent (tactical picture agent), E-commerce agent (stock trader, bidder) and Recommendation agent (Firefly, Amazon.com). Keywords: Mobile Agent (M.A), agent, paradigm, life cycle. 1. WORKING OF MOBILE AGENT A mobile agent consists of the program code and the program execution state (the current values of variables, next instruction to be executed, etc.). Initially a mobile agent resides on a computer called the home machine [1-2]. The agent is then dispatched to execute on a remote computer called a mobile agent host (a mobile agent host is also called mobile agent platform or mobile agent server). When a mobile agent is dispatched the entire code of the mobile agent and the execution state of the mobile agent is transferred to the host. The host provides a suitable execution environment for the mobile agent to execute. The mobile agent uses resources (CPU, memory, etc.) of the host to perform its task. After completing its task on the host, the mobile agent migrates to another computer. Since the state information is also transferred to the host, Mobile

Figure 1

1

181

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. 1, January 2011

agents can resume the execution of the code from where they left off in the previous host instead of having to restart execution from the beginning. This continues until the mobile agent returns to its home machine after completing execution on the last machine in its itinerary. 2. THE LIFE CYCLE OF MOBILE AGENT

3. DESCRIPTION Part-View of Agent Topology

Collaborative Agents

Collaborative Agents Cooperate Learn

Autonomous Smart Agents

Interface Agents

Figure 3 Different types of agents:Figure 2 1. 2. 3. 4. The mobile agent is created in the Home Machine. The mobile agent is dispatched to the Host Machine A for execution. The agent executes on Host Machine A. After execution the agent is cloned to create two copies. One (A mobile agent consists of the program code and the program execution state [3-4]. The mobile agent uses resources (CPU, memory etc.) of the host to perform its task) .copy is dispatched to Host Machine B and the other is dispatched to Host Machine C. The cloned copies execute on their respective hosts. After execution, Host Machine B and C send the mobile agent received by them back to the Home Machine. The Home Machine retracts the agents and the data brought by the agents is analyzed. The agents are then disposed. Agents exist in a multi-dimensional space A representative flat-list 1. 2. 3. 4. 5. 6. 7. Collaborative agents Interface agents Mobile agents Information/Internet agents Reactive agents Hybrid agents Smart Agents

5. 6.

Collaborative Agents These emphasize autonomy, and collaboration with other agents to perform their tasks. They may need to have “ social ” skills in order to communicate and negotiate with other agents.

7.

2

182

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. 1, January 2011

Collaborative Agents example 1. 2. • • • Pleiades Project at CMU. 4. Visitor-Hoster: helps a human secretary to plan the schedule of visitors to CMU matches their interests with the interests and availability of the faculty and staff. organized as a number of agents that retrieve the relevant pieces of information from several different real-world information sources, such as finger, online library search etc. Interface (Personal) Agents Emphasize autonomy, and learning in order to perform useful tasks for their owners. Examples 1. Personal appointments 2. assistants that handle your

o

Functional challenges of managing information.

BASIC ARCHITECTURE An agent server process runs on each participating host. Participating hosts are networked through links that can be lowbandwidth and unreliable. An agent is a serializable object – an object whose data as well as state can be marshaled for transportation over the network. Data marshaling is required for flattening and endoding of data structures, so that they can be sent from one computer to another. An object similarly serialized and transmitted between hosts [5-7]. Upon arrival, the object can be reconstituted and de-serialized, with its execution state restored to when it was serialized, and then the object can resume execution on the newly-arrived host system; i.e. whose execution state can be frozen for transportation and reconstituted upon arrival at a remote site.

Office Agents in Microsoft Office. "Learn" to serve the user better, by observing and imitating the user, through feedback from the user, or by interacting with other agents. The main challenge here is how to assist the user without bothering him, and how to learn effectively.

Information / Internet Agents Focus on o helping us to cope with the sheer "tyranny of information" in the Internet age. Figure 4 manage, manipulate or collate information from many distributed sources. Advantages of the agent paradigm • • o respective challenges motivations and Reducing traffic / congestion as agents are smaller in size Enhanced security over protected data especially in a broadcast mode

Help to o

Share their

3

183

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. 1, January 2011



Avoiding unnecessary data transfer: the transfer of user intention enabling selection of required data and intelligently computed abstraction. A modular approach to distributed applications. Interoperability: through a new agent layer

• •

5. MOBILE AGENT PARADIGM V/S CLIENT SERVER PARADIGM In Figure 5 above we have mobile agent paradigm and client server paradigm. The mobile agent paradigm consists of two hosts HOST A and HOST B [8-9]. The client server paradigm consists of client host and server host.

Figure 6 The agent dispatches from the client, then migrates to the server and finally migrates to the client. B. Properties of mobile agents Mobile agents have the following unique properties. 1. Adaptive Learning: Mobile agents can learn from experiences and adapt themselves to the environment. They can monitor traffic in large networks and learn about the trouble spots in the network. Based on the experiences of the agent in the network the agent can choose better routes to reach the next host. 2. Autonomy: Mobile agents can take some decisions on its own. For example, mobile agents are free to choose the next host and when to migrate to the next host. These decisions are transparent to the user and the decisions are taken in the interest of theuser. 3. Mobility: Mobile agents have the ability to move from one host to another in the network. 6. ATTRIBUTES OF MOBILE AGENT 1. 2. Code State

Figure 5

A. Evolution of the “mobile agent” paradigm The evolution of mobile agent paradigm is explained in Figure 6 as follows.

4

184

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. 1, January 2011

a. b. 3. Name

Execution state Object state

11. Computer security is provided by the operating system. 8. THREATS POSED BY MOBILE AGENTS 1) Destruction of Data, hardware, current environment.

a. b. c. 4. Location

Identifier Authority 2) Agent system type • • • 3) Block execution. Take up memory. Prevention of resources/network. access to Denial of service

7. ASSUMPTIONS ABOUT COMPUTER SYSTEMS VIOLATED BY MOBILE AGENTS 1. Whenever a program attempts some action, we can easily identify a person to whom that action can be attributed, and it is safe to assume that that person intends the action to be taken. Only persons that are known to the system can execute programs on the system. There is one security domain corresponding to each user; all actions within that domain can be treated the same way. Single-user systems require no security. Essentially all programs are obtained from easily identifiable and generally trusted sources. The users of a given piece of software are restrained by law and custom from various actions against the manufacturer’s interests. Significant security threats come from attackers running programs with the intent of accomplishing unauthorized results. Programs cross administrative boundaries only rarely, and only when people intentionally transmit them. A given instance of a program runs entirely on one machine; processes do not cross administrative boundaries at all. 6) 7)

Breach of privacy / theft of resources Use of covert channels. Obtain/transmit privileged information.

2. 3.

4)

Harassment

Display of annoying /offensive information and screen flicker. 5) Repudiation- Ability to deny an event ever happened. Denial of service. Unauthorized use or access of code/data. modification or corruption

4. 5.

6.

8) Unauthorized code/data.

7.

9) Unauthorized access, modification, corruption, or repeat of agent external communication. 9.PROTECTION METHODS MALICIOUS MOBILE AGENTS 1. Authenticating credentials • 2. certificates and digital signatures AGAINST

8.

9.

Access Control and Authorization • • Reference monitor security domains

10. A given program runs on only one particular operating system.

5

185

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. 1, January 2011

• 3.

policies

On the other hand a malicious host can tamper with the functioning of mobile agent. To illustrate this scenario consider a mobile agent that visits the servers of several airlines to buy a ticket for the lowest price. A malicious airline server can try to obtain sensitive price information from the mobile agent. The malicious server may tamper with the mobile agent and increase the prices quoted by other airlines thereby giving it an unfair advantage. Some servers may even try to steal credit card numbers from mobile agent. 13. APPLICATIONS OF MOBILE AGENTS I. II. TECHNICAL REPORTS MILITARY E-COMMERCE - Mobile agents can travel to different trading sites and help to locate the most appropriate deal, negotiate the deal and even finalize business transactions on behalf of their owners. A mobile agent can be programmed to bid in an online auction on behalf of the user. The user himself need not be online during the auction. MOBILE COMPUTING - Mobile agents can travel to different trading sites and help to locate the most appropriate deal, negotiate the deal and even finalize business transactions on behalf of their owners [10-12]. A mobile agent can be programmed to bid in an online auction on behalf of the user. The user himself need not be online during the auction. PARALLEL COMPUTING - Solving a complex problem on a single computer takes a lot of time. To overcome this, mobile agents can be written to solve the problem. These agents migrate to computers on the network, which have the required resources and use them to solve the problem in parallel thereby reducing the time required to solve the problem.

Software-based Fault Isolation • Java’s “sandbox”

4.

Monitoring • • auditing of agent’s activities setting limits

5. 6.

Proxy-based approach to host protection Code Verification - proof-carrying code

10. MOBILE AGENT SYSTEMS • Mission oriented single agents: ex. Information integration in hypermedia or pre-routing congestion awareness. Multiple agent - single agency: ex. Dynamic routing and network mapping, hidden to end users.



III.

11. BENEFITS OF MOBILE AGENTS • • • • • • Bandwidth conservation Reduction of latency Reduction of completion time Asynchronous(disconnected) communications Load balancing Dynamic deployment OF MOBILE IV.

12. DISADVANTAGES AGENTS

The main drawback of mobile agents is the security risk involved in using mobile agents .Security risks in a mobile computing environment are twofold. Firstly a malicious mobile agent can damage a host. A virus can be disguised as a mobile agent and distributed in the network causing damage to host machines that execute the agent.

V.

6

186

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. 1, January 2011

VI.

DATA COLLECTION - Consider a case wherein, data from many clients has to be processed. In the traditional client-server model, all the clients have to send their data to the server for processing resulting in high network traffic. Instead mobile agents can be sent to the individual clients to process data and send back results to the server, thereby reducing the network load. INFORMATION RETRIEVAL MONITORING SHAREWARE VIRTUAL MARKET PLACE

6.

www.ias.ac.in/resonance/July2002/pdf/July2 002p35-43.pdf

7.

doi.ieeecomputersociety.org/10.1109/MIS.2 006.120

8.

www.springerlink.com/index/u2172057t37 mp258.pdf

9.

netresearch.ics.uci.edu/.../agentos/.../hohlefficient-code

VII. VIII. IX. X.

10. www.cetuslinks.org/oo_mobile_agents.html 11. www.objs.com/agent 12. http://www.cs.dartmouth.edu/~dfk/papers/as lam:position.ps.gz RESEARCH PAPERS 1. aslam:position (BibTeX entry)

14. FUTURE SCOPE Ad Hoc networks • Mobile nodes that can be envisioned as routers for message transfer: ex. Laptops • Each node installed with a transceiver for two way communication in restricted bandwidth: signal strength may be adaptively variable. • Disconnection among caller & responder viewed as effect of link failure. • Purely distributive control with no hierarchy at the systems level • Active nodes transmit periodic beacons for neighborhood information updates. 15. REFERENCES WEBSITE REFERENCES 1. 2. 3. 4. 5. Mysimon.com D’Agents: http://agent.cs.dartmouth.edu/ Tryllian: http://www.tryllian.com Aglets: http://www.trl.ibm.co.jp/aglets en.wikipedia.org/wiki/Mobile_agent 2.

Jay Aslam and Marco Cremonini and David Kotz and Daniela Rus. Using Mobile Agents for Analyzing Intrusion in

Computer Networks. In Proceedings of the Workshop on Mobile Object Systems at ECOOP 2001, July, 2001. cybenko:functional George Matching Cybenko (BibTeX and Guofei entry) Jiang.

Conflicts:

Functional

Validation of Agents. In AAAI Workshop of Agent Conflicts, pages 14-19, Orlando, Florida, July, 1999. AAAI Press.

7

187

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close