Intrusion Tolerant Middleware
نویسندگان
چکیده
Increased reliance of applications on the software infrastructure to support distributed operations is creating new intrusion threats. In particular, there is a growing but largely unnoticed intrusion threat due to the emerging middleware technologies such as CORBA, WAP, XML support, enterprise application integrators, and Internet telephony middleware. The situation is grave because the emerging middleware technologies are relatively immature but have a high potential of use in the current and future civilian and military systems. This paper shows a practical analysis of the intrusion threats introduced due to the increased reliance of current and future mission critical applications on emerging middleware. A great deal of effort is needed to f i l l the gap between where we are and where we need to be. In particular, a technique, called FRS (fragmentation, redundancy, scattering), needs particular attention because it is central to intrusion tolerance. An important area of work is to improve FRS and imbed it in existing middleware platforms. Work in developing an Intelligent Compensating Middleware (ICM) that includes FRS as a compensating feature for existing COTS middleware is discussed. This research is being conducted at Telcordia Technologies under the ICM (Intelligent Compensating Middleware) project, funded by DARPA (BAA0015). Initial results from this project are included.
منابع مشابه
Developing a Heterogeneous Intrusion Tolerant CORBA System
Intrusion Tolerant systems provide high-integrity and high-availability services to their clients in the face of successful attacks from an adversary. The Intrusion Tolerant Distributed Object Systems (ITDOS) research project is developing an architecture for a heterogeneous intrusion tolerant distributed object system. ITDOS integrates a Byzantine Fault Tolerant multicast protocol into an open...
متن کاملIntrusion-Resilient Middleware Design and Validation
Intrusion Tolerance has become a reference paradigm for dealing with intrusions and accidental faults, achieving security and dependability in an automatic way, much along the lines of classical fault tolerance. This chapter is an introduction to the design and validation of intrusion-tolerant middleware and systems.
متن کاملA Middleware for Constructing Highly Available, Fault Tolerant, and Attack Tolerant Services
This paper describes the design of a middleware that provides support for constructing highly available, secure, fault-tolerant, and attack-tolerant services. The central component of this middleware is a group communication service that comprises of six network protocols: atomic broadcast, group membership, failure detection, attack detection, group access control, and secure intermember commu...
متن کاملIntrusion Tolerance Approaches in ITUA 1
The purpose of the Intrusion Tolerance by Unpredictable Adaptation (ITUA) project is to develop a middleware based intrusion tolerance solution that would help applications survive certain kinds of attacks. This paper presents an overview and the key aspects of the ITUA project. We will describe the kind of attacks we are considering, how unpredictability can be used for intrusion tolerance, th...
متن کاملA Survey on Intrusion-Tolerant System
Many information systems that provide useful services to people are connected to the Internet for convenience and efficiency. However, improper accessibility might make the systems susceptible to a variety of attacks. Although existing security solutions such as an intrusion detection system, intrusion prevention system, and firewalls have been designed to protect against such attacks, it is im...
متن کامل