Agent security through software mutation

被引:0
|
作者
Simmons, Sharon [1 ]
Edwards, Dennis [1 ]
Zimmerman, Travis [1 ]
机构
[1] Univ W Florida, Dept Comp Sci, Pensacola, FL 32514 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enhancements to electric power distribution grid reliability and recovery in the face of disruptions are being made possible through the incorporation of agent-based control systems. As more agents replace human controllers, the potential for catastrophic consequences of a cyber-attack are increased. One means of preventing, detecting and recovering from such incidents uses program mutation in a novel way to form the basis of a security framework. The Mutation described in this paper modifies the memory footprint of an executing process without altering its runtime behavior. Mutated processes are shown to be resistant to attacks resulting in arbitrary code execution. Instead of Byzantine failures, attacks on mutated processes result in the more easily detectable crash failure. Replication of mutated code is used with a majority voting algorithm to prevent attack consequences from occurring when an attack eventually bypasses the prevention mechanisms. An example is provided to demonstrate the code modfications done by our mutation engine. The example also shows how the mutations are used against buffer overflow attacks which are generally considered the most common form of attack. Agent controlled power distribution grids require protection from intrusion. Whether the attack originates from a careless employee of from a cyber terrorist, the consequences could be catastrophic. This method can be used to combat known and future forms of attack by giving the system the ability to protect control agents, detect attacks against them, and recover from attacks before serious consequences are realized.
引用
收藏
页码:211 / 215
页数:5
相关论文
共 50 条
  • [21] Managing supply chains of software as a service through agent negotiations
    Chen, JC
    Gold, NE
    Mehandjiev, N
    Layzell, PJ
    CEC 2005: Seventh IEEE International Conference on E-Commerce Technology, Proceedings, 2005, : 378 - 381
  • [22] Achieving Mobile Agent Systems interoperability through software layering
    Fortino, Giancarlo
    Garro, Alfredo
    Russo, Wilma
    INFORMATION AND SOFTWARE TECHNOLOGY, 2008, 50 (04) : 322 - 341
  • [23] A Survey: Agent-based Software Technology Under the Eyes of Cyber Security, Security Controls, Attacks and Challenges
    Alluhaybi, Bandar
    Alrahhal, Mohamad Shady
    Alzhrani, Ahmed
    Thayananthan, Vijey
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (08) : 211 - 230
  • [24] Software security is software reliability
    Lindner, Felix FX
    COMMUNICATIONS OF THE ACM, 2006, 49 (06) : 57 - 61
  • [25] SOFTWARE SECURITY
    PALME, J
    DATAMATION, 1974, 20 (01): : 51 - 55
  • [26] SOFTWARE SECURITY
    WALSH, S
    DATA PROCESSING, 1983, 25 (03): : 9 - 10
  • [27] Software security
    McGraw, G
    IEEE SECURITY & PRIVACY, 2004, 2 (02) : 80 - 83
  • [28] SOFTWARE SECURITY
    WALSH, ME
    JOURNAL OF SYSTEMS MANAGEMENT, 1981, 32 (10): : 6 - 13
  • [29] Software Security
    Sametinger, Johannes
    2013 20TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER BASED SYSTEMS (ECBS 2013), 2013, : 216 - 216
  • [30] A survey on resolving security issues in SaaS through software defined networks
    Shyam, Gopal K.
    Theja, Reddy Sai Sindhu
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2021, 12 (01) : 1 - 14