Defense-in-depth against computer viruses

نویسنده

  • Frederick B. Cohen
چکیده

In this paper, we discuss software based fault tolerant computing techniques used in defense against computer viruses and other integrity corruptions in modern computer systems. We begin with a summary of research on computer viruses, their potential for harm, and the extent to which this potential has been realized to date. We then examine major results on the application of fault tolerant software techniques for virus defense, including; the problems with conventional coding schemes in detecting intentional corruptions and the use of high performance cryptographic checksums for reliable detection; an optimal method for detecting viruses and preventing their further spread in untrusted computing environments; the use of redundancy and automated decision making for automatic and transparent repair of corruption and continuity of operation; and the use of fault avoidance techniques for limiting viral spread. Next we discuss the state-of-the-art in virus defense, its use of redundancy for defense-in-depth, the impact of this on the reliability of the mechanism, the implications of these results to other computing environments, and architectural issues in implementing hardware assisted virus defense based on the software fault tolerance techniques already in widespread use. Finally we summarize results, draw conclusions, and discuss further work. Copyright c © 1991, Fred Cohen ALL RIGHTS RESERVED ‡ This research was funded by ASP, PO Box 81270, Pittsburgh, PA 15217, USA

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ethical issues in computer virus distribution

W 'hen I first examined the problem of viruses, I had a severe ethical problem with publishing my results. The problem was that ifI published actual viruses , I would be creating a hazard for the computing world, while ifI did not publish some sort of program example, the subject would be too hard to understand to get the point across. After thinking about the issue for some time, I decided to ...

متن کامل

Toward an Abstract Computer Virology

We are concerned with theoretical aspects of computer viruses. For this, we suggest a new definition of viruses which is clearly based on the iteration theorem and above all on Kleene’s recursion theorem. We show that we capture in a natural way previous definitions, and in particular the one of Adleman. We establish generic constructions in order to construct viruses, and we illustrate them by...

متن کامل

Therapeutic Potential of Oncolytic Viruses in the Treatment of Lung Cancer Caused by Chemical Warfare Agents: A Narrative Review

In World War I, sulfur mustard or mustard gas was used as a chemical weapon for the first time. Years later, during the imposed war (eight years of holy defense) against the Islamic Republic of Iran, Iraq used this poisonous gas against the soldiers and people of Iranian cities. Many years after the war, many chemical veterans still suffer from its effects. Mustard gas is a strong alkylating su...

متن کامل

On the implications of computer viruses and methods of defense

In this paper, we describe much of the previous and present work on computer viruses. We begin with a short history and bibliographic summary and then describe some of the major issues that arise in the study of computer viruses and in protecting against them. We discuss most of the lines of current research and some of their features and failings. We then introduce a method by which certain cl...

متن کامل

Worm Analysis through Computer Simulation (WAtCoS)

Computer viruses have received a lot of attention. In fact, the best-known viruses have not been viruses at all, but worms, programs that spread through networks instead of modifying programs. Both viruses and worms reproduce themselves and defensive measures have focused on stopping or slowing their spread. Ultimately, though, there is no defense better than a comprehensive security strategy t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 11  شماره 

صفحات  -

تاریخ انتشار 1992