Immunix: Survivability Through Specialization

نویسندگان

  • Crispin Cowan
  • Jon Inouye
  • Lakshmi Kethana
  • Jonathan Walpole
چکیده

In large-scale systems such as the Internet, the means to exploit security aws can be readily distributed, exposing a large number of systems to vulnerability. This problem is aggravated if system implementations are both xed and widely distributed. For instance, the fact that sendmail 8.7.5 has a particular vulnerability 1] can be used by numerous intruders to attack many systems. These attacks have dire consequences, because many sites are running the same code, with the same aws. The main objective of the Immunix Project is to use specialization techniques and toolkit developed in the Synthetix project 3] to improve the survivability of operating system (OS) kernels. The key idea is to use the specialization toolkit to generate a large number of correct variants of many OS modules, so some of the variants will be resistant to new, previously unknown attacks. If there are a suucient number of variant implementations, then no single attack will be able to break into all nodes. Varying system implementation through specialization provides two important forms of defense against intrusion. First, permutating the system implementation makes it harder for intruders to exploit speciic implementation aws. Even if permutation just replaces one set of implementation aws with another set of aws, intruders cannot exploit these aws if they do not know what aws to look for. Second, adaptation provides the opportunity to respond to attack. Services that are convenient, but vulnerable to attack, can be narrowed or closed. Services that previously

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack

Defcon’s Capture the Flag (CtF) game is the largest open computer security hacking game. This year’s CtF hat rules that made it particularly difficult to be a successful defender. We entered an Immunix server, comprised of five years of IA&S, OASIS, FTN, and CHATS technologies, to see whether this system could survive sustained attack from determined experts. We describe our experience survivin...

متن کامل

A Specialization Toolkit to Increase the Diversity in Operating Systems

Virus and worm attacks that exploit system implementation details can be countered with a diversi ed set of implementations. Furthermore, immune systems show that attacks from previously unknown organisms require e ective dynamic response. In the Synthetix project, we have been developing a specialization toolkit to improve the performance of operating system kernels. The toolkit helps programm...

متن کامل

Increase the Diversity in Operating

Virus and worm attacks that exploit system implementation details can be countered with a diversiied set of implementations. Furthermore, immune systems show that attacks from previously unknown organisms require eeective dynamic response. In the Synthetix project, we have been developing a specialization toolkit to improve the performance of operating system kernels. The toolkit helps programm...

متن کامل

Optimal Coding Subgraph Selection under Survivability Constraint

Nowadays communication networks have become an essential and inevitable part of human life. Hence, there is an ever-increasing need for expanding bandwidth, decreasing delay and data transfer costs. These needs necessitate the efficient use of network facilities. Network coding is a new paradigm that allows the intermediate nodes in a network to create new packets by combining the packets recei...

متن کامل

A Multi Objective Graph Based Model for Analyzing Survivability of Vulnerable Networks

In the various fields of disaster management, choosing the best location for the Emergency Support & Supply Service Centers (ESSSCs) and the survivability of the network that provides the links between ESSSCs and their environment has a great role to be paid enough attention. This paper introduces a graph based model to measure the survivability of the linking's network. By values computed for ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997