首页 > 最新文献

SSRS '03最新文献

英文 中文
A churn-resistant peer-to-peer web caching system 一个抗流失的点对点web缓存系统
Pub Date : 2003-10-31 DOI: 10.1145/1036921.1036922
Prakash Linga, Indranil Gupta, K. Birman
Denial of service attacks on peer-to-peer (p2p) systems can arise from sources otherwise considered non-malicious. We focus on one such commonly prevalent source, called "churn". Churn arises from continued and rapid arrival and failure (or departure) of a large number of participants in the system, and traces from deployments have shown that it can lead to extremely stressful networking conditions. It has the potential to increase host loads and block a large fraction of normal insert and lookup operations in the peer-to-peer system. This paper studies a cooperative web caching system that is resistant to churn attacks. Based on the Kelips peer-to-peer routing substrate, it imposes a constant load on participants and is able to reorganize itself continuously under churn. Peer pointers are automatically established among more available participants, thus ensuring high cache hit rates even when the system is stressed under churn. In addition, the system improves on the network locality of cache accesses in previous web caching schemes. The paper presents experimental results from a real implementation running over a commodity PC cluster, as well as trace-based simulations that use real host availability traces obtained from another deployed p2p system.
对点对点(p2p)系统的拒绝服务攻击可能来自其他被认为是非恶意的来源。我们关注的是一个普遍存在的来源,称为“流失率”。由于系统中大量参与者的持续快速到达和失败(或离开),并且部署的跟踪表明,它可能导致极其紧张的网络条件。它有可能增加主机负载,并阻塞对等系统中大部分正常的插入和查找操作。本文研究了一种抗流失攻击的协同式web缓存系统。基于Kelips点对点路由基板,它对参与者施加恒定的负载,并且能够在客户流失的情况下不断进行自我重组。在更多可用的参与者之间自动建立对等指针,从而确保即使在系统处于混乱状态时也能获得高缓存命中率。此外,该系统还改进了以往web缓存方案中缓存访问的网络局部性。本文给出了运行在商用PC集群上的真实实现的实验结果,以及使用从另一个部署的p2p系统获得的真实主机可用性跟踪的基于跟踪的模拟。
{"title":"A churn-resistant peer-to-peer web caching system","authors":"Prakash Linga, Indranil Gupta, K. Birman","doi":"10.1145/1036921.1036922","DOIUrl":"https://doi.org/10.1145/1036921.1036922","url":null,"abstract":"Denial of service attacks on peer-to-peer (p2p) systems can arise from sources otherwise considered non-malicious. We focus on one such commonly prevalent source, called \"churn\". Churn arises from continued and rapid arrival and failure (or departure) of a large number of participants in the system, and traces from deployments have shown that it can lead to extremely stressful networking conditions. It has the potential to increase host loads and block a large fraction of normal insert and lookup operations in the peer-to-peer system. This paper studies a cooperative web caching system that is resistant to churn attacks. Based on the Kelips peer-to-peer routing substrate, it imposes a constant load on participants and is able to reorganize itself continuously under churn. Peer pointers are automatically established among more available participants, thus ensuring high cache hit rates even when the system is stressed under churn. In addition, the system improves on the network locality of cache accesses in previous web caching schemes. The paper presents experimental results from a real implementation running over a commodity PC cluster, as well as trace-based simulations that use real host availability traces obtained from another deployed p2p system.","PeriodicalId":414343,"journal":{"name":"SSRS '03","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129524106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
TRIAD: a framework for survivability architecting TRIAD:可生存性架构的框架
Pub Date : 2003-10-31 DOI: 10.1145/1036921.1036933
A. Moore, R. Ellison
High confidence in a system's survivability requires an accurate understanding of the system's threat environment and the impact of that environment on system operations. This paper describes a framework for intrusion-aware design called trustworthy refinement through intrusion-aware design (TRIAD). The spiral structure of TRIAD iterates through three sectors of activity for developing the architectural strategy, for instantiating the architecture using technical components, and for analyzing the impact of the threat environment on system operations. TRIAD helps developers of complex, internetworked information systems to formulate, implement, and maintain a coherent, justifiable, and affordable survivability strategy that addresses mission-compromising threats for their organization. TRIAD facilitates planning for the inevitable change to the threat and operational environment and helps trace the effect of change back to the survivability requirements and architecture.
对系统生存能力的高信心要求对系统的威胁环境和该环境对系统操作的影响有准确的理解。本文描述了一种入侵感知设计框架,称为通过入侵感知设计(TRIAD)进行可信细化。TRIAD的螺旋结构在开发体系结构策略、使用技术组件实例化体系结构以及分析威胁环境对系统操作的影响的三个活动领域中进行迭代。TRIAD帮助复杂的互联网信息系统开发人员制定、实施和维护一个连贯的、合理的、可负担得起的生存策略,为他们的组织解决危及任务的威胁。TRIAD促进了对不可避免的威胁和操作环境变化的规划,并帮助跟踪变化的影响,回到生存能力需求和体系结构。
{"title":"TRIAD: a framework for survivability architecting","authors":"A. Moore, R. Ellison","doi":"10.1145/1036921.1036933","DOIUrl":"https://doi.org/10.1145/1036921.1036933","url":null,"abstract":"High confidence in a system's survivability requires an accurate understanding of the system's threat environment and the impact of that environment on system operations. This paper describes a framework for intrusion-aware design called trustworthy refinement through intrusion-aware design (TRIAD). The spiral structure of TRIAD iterates through three sectors of activity for developing the architectural strategy, for instantiating the architecture using technical components, and for analyzing the impact of the threat environment on system operations. TRIAD helps developers of complex, internetworked information systems to formulate, implement, and maintain a coherent, justifiable, and affordable survivability strategy that addresses mission-compromising threats for their organization. TRIAD facilitates planning for the inevitable change to the threat and operational environment and helps trace the effect of change back to the survivability requirements and architecture.","PeriodicalId":414343,"journal":{"name":"SSRS '03","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128952748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SelectCast: a scalable and self-repairing multicast overlay routing facility SelectCast:一个可扩展和自我修复的多播覆盖路由设施
Pub Date : 2003-10-31 DOI: 10.1145/1036921.1036925
Adrian Bozdog, R. V. Renesse, D. Dumitriu
In this paper we describe SelectCast, a self-repairing multicast overlay routing facility for supporting publish/subscribe applications. Select Cast is a peer-to-peer protocol, and lever-ages Astrolabe, a secure distributed information management system. SelectCast uses replication to recover quickly from transient failures, as well as Astrolabe's aggregation facilities to recover from long-term failures or adapt to changes in load or QoS requirements. In order to evaluate the scalability and performance of SelectCast, and compare these with other multicast facilities, we built a multicast testing facility on NetBed. This paper reports latency and load results for SelectCast, compared to both native IP multicast and Yoid.
在本文中,我们描述了SelectCast,一个支持发布/订阅应用程序的自修复多播覆盖路由工具。Select Cast是一个点对点协议,并利用Astrolabe,一个安全的分布式信息管理系统。SelectCast使用复制从短暂故障中快速恢复,以及Astrolabe的聚合设施从长期故障中恢复或适应负载或QoS要求的变化。为了评估SelectCast的可扩展性和性能,并将其与其他组播工具进行比较,我们在NetBed上构建了一个组播测试工具。本文报告了与本地IP多播和Yoid相比,SelectCast的延迟和负载结果。
{"title":"SelectCast: a scalable and self-repairing multicast overlay routing facility","authors":"Adrian Bozdog, R. V. Renesse, D. Dumitriu","doi":"10.1145/1036921.1036925","DOIUrl":"https://doi.org/10.1145/1036921.1036925","url":null,"abstract":"In this paper we describe SelectCast, a self-repairing multicast overlay routing facility for supporting publish/subscribe applications. Select Cast is a peer-to-peer protocol, and lever-ages Astrolabe, a secure distributed information management system. SelectCast uses replication to recover quickly from transient failures, as well as Astrolabe's aggregation facilities to recover from long-term failures or adapt to changes in load or QoS requirements. In order to evaluate the scalability and performance of SelectCast, and compare these with other multicast facilities, we built a multicast testing facility on NetBed. This paper reports latency and load results for SelectCast, compared to both native IP multicast and Yoid.","PeriodicalId":414343,"journal":{"name":"SSRS '03","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132351582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Sliding-window self-healing key distribution 滑动窗口自修复键分布
Pub Date : 2003-10-31 DOI: 10.1145/1036921.1036930
Sara Miner More, Michael Malkin, Jessica Staddon, D. Balfanz
We propose a new method for distributing a common key to a dynamic group over an unreliable channel. In [15], an unconditionally secure "self-healing" protocol that solves this problem and has significant advantages over previous work in this area is presented. However, the protocol suffers from inconsistent robustness, high overhead and expensive maintenance costs. We propose a more practical self-healing protocol that attempts to address these three problems. First, we use a sliding window to make error recovery consistently robust. Second, we significantly reduce overhead. Finally, we give the group manager the ability to spread the cost of personal key distribution over multiple sessions, rather than having to distribute new personal keys to all users at the same time.
提出了一种通过不可靠信道向动态组分发公共密钥的新方法。在[15]中,提出了一种无条件安全的“自愈”协议,该协议解决了这一问题,并且比该领域的先前工作具有显著的优势。然而,该协议存在鲁棒性不一致、开销高、维护成本昂贵等问题。我们提出了一个更实用的自我修复协议,试图解决这三个问题。首先,我们使用滑动窗口使错误恢复始终保持鲁棒性。其次,我们大大减少了开销。最后,我们让组管理员能够将个人密钥分发的成本分摊到多个会话中,而不必同时向所有用户分发新的个人密钥。
{"title":"Sliding-window self-healing key distribution","authors":"Sara Miner More, Michael Malkin, Jessica Staddon, D. Balfanz","doi":"10.1145/1036921.1036930","DOIUrl":"https://doi.org/10.1145/1036921.1036930","url":null,"abstract":"We propose a new method for distributing a common key to a dynamic group over an unreliable channel. In [15], an unconditionally secure \"self-healing\" protocol that solves this problem and has significant advantages over previous work in this area is presented. However, the protocol suffers from inconsistent robustness, high overhead and expensive maintenance costs. We propose a more practical self-healing protocol that attempts to address these three problems. First, we use a <i>sliding window</i> to make error recovery consistently robust. Second, we significantly reduce overhead. Finally, we give the group manager the ability to spread the cost of personal key distribution over multiple sessions, rather than having to distribute new personal keys to all users at the same time.","PeriodicalId":414343,"journal":{"name":"SSRS '03","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134633669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
ARECA: a highly attack resilient certification authority ARECA:具有高度抗攻击能力的证书颁发机构
Pub Date : 2003-10-31 DOI: 10.1145/1036921.1036927
Jiwu Jing, Peng Liu, D. Feng, Ji Xiang, Neng Gao, Jingqiang Lin
Certification Authorities (CA) are a critical component of a PKI. All the certificates issued by a CA will become invalid when the (signing) private key of the CA is compromised. Hence it is a very important issue to protect the private key of an online CA. ARECA systems, built on top of threshold cryptography, ensure the security of a CA through a series of defense-in-depth protections. ARECA systems won't be compromised when a few system components are compromised or some system administrators betray. The private key of a CA is protected by distributing different shares of the key to different (signing) components and by ensuring that any component of the CA is unable to reconstruct the private key. In addition, the multi-layer system architecture of ARECA makes it very difficult to attack from outside. Several threshold-cryptography-based methods are proposed in the literature to construct an intrusion tolerant CA, and the uniqueness of ARECA is that it engineers a novel two phase signature composition scheme and a multi-layer CA protection architecture. As a result, ARECA is (a) practical, (b) highly resilient to both insider and outsider attacks that compromise one or more components, and (c) can prevent a variety of outside attacks.
证书颁发机构(CA)是PKI的关键组成部分。当CA的(签名)私钥泄露时,CA颁发的所有证书都将失效。因此,如何保护在线CA的私钥是一个非常重要的问题。建立在阈值密码学基础上的ARECA系统,通过一系列的纵深防御来保证CA的安全。当一些系统组件被破坏或一些系统管理员背叛时,ARECA系统不会受到损害。通过将密钥的不同共享分发给不同的(签名)组件,并确保CA的任何组件都无法重构私钥,CA的私钥得到了保护。此外,ARECA的多层体系结构使得从外部攻击非常困难。文献中提出了几种基于阈值密码学的方法来构建入侵容忍CA,而ARECA的独特之处在于它设计了一种新颖的两阶段签名组合方案和多层CA保护体系结构。因此,ARECA具有(a)实用性,(b)对危及一个或多个组件的内部和外部攻击具有高度弹性,以及(c)可以防止各种外部攻击。
{"title":"ARECA: a highly attack resilient certification authority","authors":"Jiwu Jing, Peng Liu, D. Feng, Ji Xiang, Neng Gao, Jingqiang Lin","doi":"10.1145/1036921.1036927","DOIUrl":"https://doi.org/10.1145/1036921.1036927","url":null,"abstract":"Certification Authorities (CA) are a critical component of a PKI. All the certificates issued by a CA will become invalid when the (signing) private key of the CA is compromised. Hence it is a very important issue to protect the private key of an online CA. ARECA systems, built on top of threshold cryptography, ensure the security of a CA through a series of defense-in-depth protections. ARECA systems won't be compromised when a few system components are compromised or some system administrators betray. The private key of a CA is protected by distributing different shares of the key to different (signing) components and by ensuring that any component of the CA is unable to reconstruct the private key. In addition, the multi-layer system architecture of ARECA makes it very difficult to attack from outside. Several threshold-cryptography-based methods are proposed in the literature to construct an intrusion tolerant CA, and the uniqueness of ARECA is that it engineers a novel two phase signature composition scheme and a multi-layer CA protection architecture. As a result, ARECA is (a) practical, (b) highly resilient to both insider and outsider attacks that compromise one or more components, and (c) can prevent a variety of outside attacks.","PeriodicalId":414343,"journal":{"name":"SSRS '03","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128315871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An intrusion tolerant architecture for dynamic content internet servers 动态内容互联网服务器的入侵容忍体系结构
Pub Date : 2003-10-31 DOI: 10.1145/1036921.1036934
Ayda Saïdane, Y. Deswarte, V. Nicomette
This paper describes a generic architecture for intrusion tolerant Internet servers. It aims to build systems that are able to survive attacks in the context of an open network such as the Internet. To do so, the design is based on fault tolerance techniques, in particular redundancy and diversification. These techniques give a system the additional resources to continue delivering the correct service to its legitimate clients even when active attacks are corrupting parts of the system components.
本文描述了一种容错Internet服务器的通用体系结构。它的目标是建立能够在像互联网这样的开放网络环境中抵御攻击的系统。为此,设计基于容错技术,特别是冗余和多样化。这些技术为系统提供了额外的资源,即使在主动攻击破坏了系统组件的某些部分时,也可以继续向其合法客户端提供正确的服务。
{"title":"An intrusion tolerant architecture for dynamic content internet servers","authors":"Ayda Saïdane, Y. Deswarte, V. Nicomette","doi":"10.1145/1036921.1036934","DOIUrl":"https://doi.org/10.1145/1036921.1036934","url":null,"abstract":"This paper describes a generic architecture for intrusion tolerant Internet servers. It aims to build systems that are able to survive attacks in the context of an open network such as the Internet. To do so, the design is based on fault tolerance techniques, in particular redundancy and diversification. These techniques give a system the additional resources to continue delivering the correct service to its legitimate clients even when active attacks are corrupting parts of the system components.","PeriodicalId":414343,"journal":{"name":"SSRS '03","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131643960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Self-regenerative software components 自再生软件组件
Pub Date : 2003-10-31 DOI: 10.1145/1036921.1036935
Hassen Saïdi, B. Dutertre, Joshua Levy, A. Valdes
Self-regenerative capabilities are a new trend in survivable system design. Self-regeneration ensures the property that a system's vulnerabilities cannot be exploited to the extent that the mission objective is compromised, but instead that the vulnerabilities are eventually removed, and system functionality is restored. To establish the usefulness of self-regenerative capabilities in the design of survivable systems, it is important to ensure that a system satisfying the self-regenerative requirement is survivable, and software engineering practices and tool support are available for building self-regenerative systems. This paper emphasizes the need for formal definition of the concept of self-regenerative systems in general and self-regenerative software components in particular. We propose a simple formal definition of a self-regenerative software component and we propose to adapt well-established formal software validation techniques to build tool support to implement self-regenerative capabilities at the component level.
自我再生能力是可生存系统设计的新趋势。自我再生确保系统的漏洞不会被利用到破坏任务目标的程度,而是漏洞最终被移除,系统功能被恢复。为了在可生存系统的设计中建立自再生能力的有用性,重要的是要确保满足自再生需求的系统是可生存的,并且软件工程实践和工具支持可用于构建自再生系统。本文强调需要正式定义自再生系统的概念,特别是自再生软件组件。我们提出了自再生软件组件的一个简单的正式定义,并且我们建议采用已建立的正式软件验证技术来构建工具支持,以在组件级别实现自再生能力。
{"title":"Self-regenerative software components","authors":"Hassen Saïdi, B. Dutertre, Joshua Levy, A. Valdes","doi":"10.1145/1036921.1036935","DOIUrl":"https://doi.org/10.1145/1036921.1036935","url":null,"abstract":"Self-regenerative capabilities are a new trend in survivable system design. Self-regeneration ensures the property that a system's vulnerabilities cannot be exploited to the extent that the mission objective is compromised, but instead that the vulnerabilities are eventually removed, and system functionality is restored. To establish the usefulness of self-regenerative capabilities in the design of survivable systems, it is important to ensure that a system satisfying the self-regenerative requirement is survivable, and software engineering practices and tool support are available for building self-regenerative systems. This paper emphasizes the need for formal definition of the concept of self-regenerative systems in general and self-regenerative software components in particular. We propose a simple formal definition of a self-regenerative software component and we propose to adapt well-established formal software validation techniques to build tool support to implement self-regenerative capabilities at the component level.","PeriodicalId":414343,"journal":{"name":"SSRS '03","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124862658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Continual repair for windows using the event log 使用事件日志对窗口进行持续修复
Pub Date : 2003-10-31 DOI: 10.1145/1036921.1036932
James C. Reynolds, L. Clough
There is good reason to base intrusion detection on data from the host. Unfortunately, most operating systems do not provide all the data needed in readily available logs. Ironically, perhaps, Window NT and its successor, Windows 2000, provide much of the necessary data, at least for security events. We have developed a host-based intrusion detector for these platforms that meets the generally accepted criteria for a good Intrusion Detection System. Its architecture is sufficiently flexible to meet these criteria largely by relying on native mechanisms. Where there are identified gaps in the data from the native security event log, they can be filled by data from other sensors by using the same event-logging interface. The IDS will also terminate unauthorized processes, delete unauthorized files, and restore deleted or modified files continually without lengthy recovery due to compromise. We call this feature Continual Repair. It is an existence proof that self-regenerative systems are possible.
基于来自主机的数据进行入侵检测是有充分理由的。不幸的是,大多数操作系统并没有在随时可用的日志中提供所需的所有数据。具有讽刺意味的是,Windows NT和它的后继者Windows 2000提供了许多必要的数据,至少对于安全事件是这样。我们为这些平台开发了一个基于主机的入侵检测器,它符合一个好的入侵检测系统的普遍接受的标准。它的体系结构非常灵活,主要依靠本地机制来满足这些标准。如果来自本机安全事件日志的数据中存在已识别的空白,则可以通过使用相同的事件日志记录接口使用来自其他传感器的数据来填充这些空白。IDS还将终止未经授权的进程,删除未经授权的文件,并持续地恢复已删除或修改的文件,而不会由于受到损害而进行冗长的恢复。我们称之为持续修复。这证明了自我再生系统是可能存在的。
{"title":"Continual repair for windows using the event log","authors":"James C. Reynolds, L. Clough","doi":"10.1145/1036921.1036932","DOIUrl":"https://doi.org/10.1145/1036921.1036932","url":null,"abstract":"There is good reason to base intrusion detection on data from the host. Unfortunately, most operating systems do not provide all the data needed in readily available logs. Ironically, perhaps, Window NT and its successor, Windows 2000, provide much of the necessary data, at least for security events. We have developed a host-based intrusion detector for these platforms that meets the generally accepted criteria for a good Intrusion Detection System. Its architecture is sufficiently flexible to meet these criteria largely by relying on native mechanisms. Where there are identified gaps in the data from the native security event log, they can be filled by data from other sensors by using the same event-logging interface. The IDS will also terminate unauthorized processes, delete unauthorized files, and restore deleted or modified files continually without lengthy recovery due to compromise. We call this feature Continual Repair. It is an existence proof that self-regenerative systems are possible.","PeriodicalId":414343,"journal":{"name":"SSRS '03","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123335508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Tolerating denial-of-service attacks using overlay networks: impact of topology 使用覆盖网络容忍拒绝服务攻击:拓扑的影响
Pub Date : 2003-10-31 DOI: 10.1145/1036921.1036926
Ju Wang, L. Lu, A. Chien
Proxy-network based overlays have been proposed to protect Internet Applications against Denial-of-Service attacks by hiding an application's location. We study how a proxy network's topology influences the effectiveness of location-hiding. We present two theorems which quantitatively characterize when proxy networks are robust against attacks (attackers' impact can be quickly and completely removed), and when they are vulnerable to attacks (attackers' impact cannot be completely removed). Using these theorems, we study a range of proxy network topologies, and identify those topologies favorable for location-hiding and resisting Denial-of-Service attacks. We have found that popular overlay network topologies such as Chord [25], which has been suggested for location-hiding, is in fact not a favorable topology for such purposes; we have also shown that CAN [21], a less popular overlay network, can be a good topology for location-hiding. Our theoretical results provide a set of sound design principles on proxy networks used for location-hiding.
基于代理网络的覆盖被提议通过隐藏应用程序的位置来保护Internet应用程序免受拒绝服务攻击。我们研究了代理网络的拓扑结构如何影响位置隐藏的有效性。我们提出了两个定理,它们定量地描述了代理网络何时对攻击具有鲁棒性(攻击者的影响可以快速完全消除),以及何时易受攻击(攻击者的影响不能完全消除)。利用这些定理,我们研究了一系列代理网络拓扑结构,并确定了有利于位置隐藏和抵抗拒绝服务攻击的拓扑结构。我们发现,流行的覆盖网络拓扑,如Chord[25],已被建议用于位置隐藏,实际上不是用于此类目的的有利拓扑;我们还表明CAN[21],一种不太流行的覆盖网络,可以是一种很好的位置隐藏拓扑。我们的理论结果提供了一套用于位置隐藏的代理网络的合理设计原则。
{"title":"Tolerating denial-of-service attacks using overlay networks: impact of topology","authors":"Ju Wang, L. Lu, A. Chien","doi":"10.1145/1036921.1036926","DOIUrl":"https://doi.org/10.1145/1036921.1036926","url":null,"abstract":"Proxy-network based overlays have been proposed to protect Internet Applications against Denial-of-Service attacks by hiding an application's location. We study how a proxy network's topology influences the effectiveness of location-hiding. We present two theorems which quantitatively characterize when proxy networks are robust against attacks (attackers' impact can be quickly and completely removed), and when they are vulnerable to attacks (attackers' impact cannot be completely removed). Using these theorems, we study a range of proxy network topologies, and identify those topologies favorable for location-hiding and resisting Denial-of-Service attacks. We have found that popular overlay network topologies such as Chord [25], which has been suggested for location-hiding, is in fact not a favorable topology for such purposes; we have also shown that CAN [21], a less popular overlay network, can be a good topology for location-hiding. Our theoretical results provide a set of sound design principles on proxy networks used for location-hiding.","PeriodicalId":414343,"journal":{"name":"SSRS '03","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130633757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Security analysis of SITAR intrusion tolerance system SITAR入侵容忍系统的安全性分析
Pub Date : 2003-10-31 DOI: 10.1145/1036921.1036924
Dazhi Wang, B. Madan, Kishor S. Trivedi
Security is an important QoS attribute for characterizing intrusion tolerant computing systems. Frequently however, the security of computing systems is assessed in a qualitative manner based on the presence and absence of certain functional characteristics and security mechanisms. Such a characterization is not only ad hoc, it also lacks rigorous scientific and systematic basis. Some recent research efforts have emphasized the need for a quantitative assessment of security attributes for intrusion tolerant systems. Intrusion tolerant systems are not only complex, but also have to operate in an environment made unpredictable due to the unpredictable actions of bona-fide and non bona-fide users. This makes quantitative security analysis a difficult problem. Earlier approaches to security modelling have been based on the use of Markov models. Capturing details of real architectures in a manually constructed Markov model is difficult. We advocate the use of higher level formalism based on stochastic Petri nets for modelling and quantitative security analysis of intrusion tolerant systems. To validate our approach, we use an experimental intrusion tolerant systems known as the SITAR (scalable intrusion tolerant architecture) currently being implemented jointly at MCNC and Duke University as our target system. It is shown that the resulting analysis is useful in determining gains in security by reconfiguring such a system in terms of increase in redundancy under varying threat levels.
安全性是表征入侵容忍计算系统的一个重要QoS属性。然而,计算系统的安全性通常是基于某些功能特征和安全机制的存在与否,以定性的方式进行评估的。这样的定性不仅是临时性的,而且缺乏严谨的科学和系统依据。最近的一些研究工作强调了对入侵容忍系统的安全属性进行定量评估的必要性。入侵容忍系统不仅复杂,而且必须在一个由于真实用户和非真实用户的不可预测的行为而变得不可预测的环境中运行。这使得定量安全分析成为一个难题。早期的安全建模方法是基于马尔可夫模型的使用。在手工构建的马尔可夫模型中捕捉真实体系结构的细节是困难的。我们提倡使用基于随机Petri网的高级形式化方法对入侵容忍系统进行建模和定量安全分析。为了验证我们的方法,我们使用了一个实验性的入侵容忍系统,称为SITAR(可扩展的入侵容忍架构),目前正在MCNC和杜克大学联合实施,作为我们的目标系统。结果表明,根据不同威胁级别下冗余的增加,通过重新配置这样的系统来确定安全性的增益,结果分析是有用的。
{"title":"Security analysis of SITAR intrusion tolerance system","authors":"Dazhi Wang, B. Madan, Kishor S. Trivedi","doi":"10.1145/1036921.1036924","DOIUrl":"https://doi.org/10.1145/1036921.1036924","url":null,"abstract":"Security is an important QoS attribute for characterizing intrusion tolerant computing systems. Frequently however, the security of computing systems is assessed in a qualitative manner based on the presence and absence of certain functional characteristics and security mechanisms. Such a characterization is not only ad hoc, it also lacks rigorous scientific and systematic basis. Some recent research efforts have emphasized the need for a quantitative assessment of security attributes for intrusion tolerant systems. Intrusion tolerant systems are not only complex, but also have to operate in an environment made unpredictable due to the unpredictable actions of bona-fide and non bona-fide users. This makes quantitative security analysis a difficult problem. Earlier approaches to security modelling have been based on the use of Markov models. Capturing details of real architectures in a manually constructed Markov model is difficult. We advocate the use of higher level formalism based on stochastic Petri nets for modelling and quantitative security analysis of intrusion tolerant systems. To validate our approach, we use an experimental intrusion tolerant systems known as the SITAR (scalable intrusion tolerant architecture) currently being implemented jointly at MCNC and Duke University as our target system. It is shown that the resulting analysis is useful in determining gains in security by reconfiguring such a system in terms of increase in redundancy under varying threat levels.","PeriodicalId":414343,"journal":{"name":"SSRS '03","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128443969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
期刊
SSRS '03
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1