Agent security through software mutation

被引:0
|
作者
Simmons, Sharon [1 ]
Edwards, Dennis [1 ]
Zimmerman, Travis [1 ]
机构
[1] Univ W Florida, Dept Comp Sci, Pensacola, FL 32514 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enhancements to electric power distribution grid reliability and recovery in the face of disruptions are being made possible through the incorporation of agent-based control systems. As more agents replace human controllers, the potential for catastrophic consequences of a cyber-attack are increased. One means of preventing, detecting and recovering from such incidents uses program mutation in a novel way to form the basis of a security framework. The Mutation described in this paper modifies the memory footprint of an executing process without altering its runtime behavior. Mutated processes are shown to be resistant to attacks resulting in arbitrary code execution. Instead of Byzantine failures, attacks on mutated processes result in the more easily detectable crash failure. Replication of mutated code is used with a majority voting algorithm to prevent attack consequences from occurring when an attack eventually bypasses the prevention mechanisms. An example is provided to demonstrate the code modfications done by our mutation engine. The example also shows how the mutations are used against buffer overflow attacks which are generally considered the most common form of attack. Agent controlled power distribution grids require protection from intrusion. Whether the attack originates from a careless employee of from a cyber terrorist, the consequences could be catastrophic. This method can be used to combat known and future forms of attack by giving the system the ability to protect control agents, detect attacks against them, and recover from attacks before serious consequences are realized.
引用
收藏
页码:211 / 215
页数:5
相关论文
共 50 条
  • [1] Security infrastructure for software agent society
    He, Q
    Sycara, KP
    Su, ZM
    TRUST AND DECEPTION IN VIRTUAL SOCIETIES, 2001, : 139 - 156
  • [2] Continuous software security through security prioritisation meetings
    Tondel, Inger Anne
    Cruzes, Daniela Soares
    JOURNAL OF SYSTEMS AND SOFTWARE, 2022, 194
  • [3] Addressing Mobile Agent Security through Agent Collaboration
    Jean, Evens
    Jiao, Yu
    Hurson, Ali R.
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2007, 3 (02): : 43 - 53
  • [4] A security based model for mobile agent software systems
    Xu, HP
    Zhang, ZG
    Shatz, SM
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2005, 15 (04) : 719 - 746
  • [5] Software protection through dynamic code mutation
    Madou, M
    Anckaert, B
    Moseley, P
    Debray, S
    De Sutter, B
    De Bosschere, K
    INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 194 - 206
  • [6] Improving software security through an integrated approach
    Gan, Zaobin
    Wei, Dengwei
    Varadharajan, Vijay
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 437 - +
  • [7] Research on Mobile Agent Security of Application Software in Open Platform
    Zhao, Jingsheng
    Zhang, Wei
    Yuan, Chao
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 1332 - 1336
  • [8] Controlling Security of Software Development with Multi-agent System
    Moradian, Esmiralda
    Hakansson, Anne
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT IV, 2010, 6279 : 98 - 107
  • [9] Mobile agent security through multi-agent cryptographic protocols
    Stephen, K
    Xu, K
    IC'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2003, : 462 - 468
  • [10] Managing Software Security Risks through an Integrated Computational
    Alharbi, Abdullah
    Alosaimi, Wael
    Alyami, Hashem
    Nadeem, Mohd
    Faizan, Mohd
    Agrawal, Alka
    Kumar, Rajeev
    Khan, Raees Ahmad
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 28 (01): : 179 - 194