A Comparison of Mobile Agent and SNMP Message Passing for Network Security Management Using Event Cases

  • Ching-hang Fong
  • Gerard Parr
  • Philip Morrow
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4268)

Abstract

Research has proposed that next generation Mobile Agent (MA) technology will achieve the overall notion of “Zero Touch” network management. The advantages offered by using MA-based Network Manage-ment (MANM) include reduction in network traffic, intelligence, automation, fault-tolerance, and robustness. From our previous research, we have developed a security-focused MA framework (MASAM) for achieving active network management. This paper aims to examine the implication of network traffic load when implementing network security management by using MANM through four simulated security attack event cases. Evaluation results indicate that the MANM approach can enhance performance and security when dealing with various security attacks.

Keywords

Network Management Mobile Agent Security Architecture Security Attack Event Case 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Harrington, D., Presuhn, R., Wijnen, B.: An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks, RFC3411, IETF (2002)Google Scholar
  2. 2.
    ISO/IEC 9596-1:1998, Common management information protocol - Part 1: Specification, Open Systems Interconnection (OSI) (October 2003)Google Scholar
  3. 3.
    ITU-T X.700, X.700: Management framework for Open Systems Interconnection (OSI) for CCITT applications, ITU-T Recommendations (September 1992)Google Scholar
  4. 4.
    Stephan, R., Ray, P., Paramesh, N.: Network management platform based on mobile agents. International Journal of Network Management 14, 59–73 (2004)CrossRefGoogle Scholar
  5. 5.
    Du, T.C., Li, E.Y., Chang, A.-P.: Mobile Agent in Distributed Network Management. Journal of Communications of the ACM 46(7), 127–132 (2003)CrossRefGoogle Scholar
  6. 6.
    Papavassiliou, S., Puliafito, A., Tomarchio, O., Ye, J.: Mobile agent based approach for efficient network management and resource allocation: framework and applications. IEEE Journal on Selected Areas in Communications 20(4), 858–872 (2002)CrossRefGoogle Scholar
  7. 7.
    Nwana, H.S.: Software Agents: An Overview. Knowledge Engineering Review 11(3), 205–244 (1996)CrossRefGoogle Scholar
  8. 8.
    OMG.: Agent Technology, Green Paper, OMG Document agent 00-09-01, Version 1.0, Agent Platform Special Interest Group, Object Management Group (OMG) (September 2000), available online at: http://www.objs.com/agent/index.html
  9. 9.
    Gavalas, D., Greenwood, D., Ghanbari, M., O’Mahony, M.: An infrastructure for distributed and dynamic network management based on mobile agent technology. In: IEEE International Conference on Communications, pp. 1362–1366 (1999)Google Scholar
  10. 10.
    Reiser, H., Vogt, G.: Threat Analysis and Security Architecture of Mobile Agent based Management Systems. In: Proceedings of NOMS 2000, IEEE/IFIP Network Operations and Management Symposium, Honolulu, Hawaii, USA (April 2000)Google Scholar
  11. 11.
    Yang, K., Galis, A., Mota, T., Michalas, A.: Mobile Agent Security Facility for Safe Configuration of IP Networks, MANTRIP, the EU IST project (2002)Google Scholar
  12. 12.
    Baldi, M., Gai, S., Picco, G.: Exploiting Code Mobility in Decentralized and Flexible Network Management. In: Rothermel, K., Popescu-Zeletin, R. (eds.) MA 1997. LNCS, vol. 1219. Springer, Heidelberg (1997)Google Scholar
  13. 13.
    Papavassiliou, S., Puliafito, A., Tomarchio, O., Ye, J.: Mobile Agent-Based Approach for Efficient Network Management and Resource Allocation: Framework and Applications. IEEE Transactions on Systems 20(4) (May 2002)Google Scholar
  14. 14.
    Fong, C.-h., Parr, G., Morrow, P.: Security Implications of Mobile Agent based Network Management: a Review. In: EPSRC PostGraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, pp. 326–332 (2005), available online at: http://kenbane.infc.ulst.ac.uk/~ching/paper/PGNet2005-SIMANM.pdf
  15. 15.
    Fong, C.-h., Parr, G., Morrow, P.: MASAM: A Mobile Agent Based Security Framework in Supporting Active Communications Network Management. Technical Paper, Faculty of Engineering, University of Ulster, UK (April 2006), http://kenbane.infc.ulst.ac.uk/~ching/paper/TechPaper2006-MASAM.pdf
  16. 16.
    Bruschi, D., Ornaghi, A., Rosti, E.: S-ARP: a secure address resolution protocol. In: Proceedings of 19th Annual Computer Security Applications Conference, pp. 66–74 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Ching-hang Fong
    • 1
  • Gerard Parr
    • 1
  • Philip Morrow
    • 1
  1. 1.School of Computing and Information Engineering, Faculty of EngineeringUniversity of UlsterColeraine, Co. LondonderryUnited Kingdom

Personalised recommendations