Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
نویسندگان
چکیده
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is a high probability that systems will be successfully attacked and a critical system must fend off or at least limit the damage caused by unknown and/or undetected attacks. In prior work, we developed a Self-Cleansing Intrusion Tolerance (SCIT) architecture that achieves the above goal by constantly cleansing the servers and rotating the role of individual servers. In this paper, we show that SCIT operations can be incorruptibly enforced with hardware enhancements. We then present an incorruptible SCIT design for use by one of the most critical infrastructures of the Internet, the domain name systems. We will show the advantages of our designs in the following areas: (1) incorruptible intrusion tolerance, (2) high availability, (3) scalability, the support for using high degrees of hardware/server redundancy to improve both system security and service dependability, and (4) in the case of SCIT-based DNSSEC, protection of the DNS master file and cryptographic keys. It is our belief that incorruptible intrusion tolerance as presented here constitutes a new, effective layer of system defense for critical information systems.
منابع مشابه
Self-Cleansing Systems for Intrusion Containment
In this paper, we discuss the application of highavailability computing systems to intrusion containment. Intrusion Management Systems (IMS) serve to protect complex computer systems from unauthorized intrusions. The traditional IMS approaches rely on intrusion prevention and detection, followed by implementation of intrusion resistance procedures. A key assumption of a traditional IMS is that ...
متن کاملCountering Web Defacing Attacks with System Self Cleansing
Web defacing is a form of system intrusion that aims to subvert the contents of a web site. In this paper, we present a defense mechanism that is based on high availability computing, whereby a backup server is available to immediately take over in the presence of server failures. Our approach, called Self-Cleansing Intrusion Tolerance (SCIT), pushes the concept of highavailability computing on...
متن کاملRoViM: Rotating Virtual Machines for Security and Fault-Tolerance
Nowadays, the field of embedded system experiences a number of changes. On one hand, recent cyber attacks against safety-critical systems demonstrate that malware can force safetycritical systems to endanger human lives and harm the environment. Therefore, a new requirement of security have arisen for safety-critical and embedded systems. However, security should be designed hand in hand with s...
متن کاملSelf Cleansing and Intrusion Tolerance Another layer of server protection
Towards an EU Policy Initiative 7 on Critical CIIP
متن کاملDetecting Active Bot Networks Based on DNS Traffic Analysis
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JNW
دوره 1 شماره
صفحات -
تاریخ انتشار 2006