{"title":"第四届入侵容忍系统最新进展研讨会,2010","authors":"M. Correia, P. Pal","doi":"10.1109/DSN.2010.5544420","DOIUrl":null,"url":null,"abstract":"Design and operational vulnerabilities are accepted as inevitable in today’s complex computer systems. The distributed and networked nature of the systems that are currently in use and being developed facilitate discovery and exploitation of these flaws in increasingly new and easier ways. Intrusion Tolerance acknowledges that it is impossible to completely prevent attacks and intrusions, and that it is often impossible to accurately detect the act of intrusion and stop it early enough. Intrusion Tolerance research therefore aims to develop technologies that enable computer systems to continue to operate correctly despite attacks, and deny the attacker/intruder the success they seek. For instance, an intrusion-tolerant system may suffer partial loss of service or resources due to the attack, but it will continue to provide critical services in a degraded mode or trigger automatic mechanisms to regain and recover the compromised services and resources. Similar goals are being pursued in Survivability, Byzantine Fault Tolerance, Self-regenerative and Autonomic Systems. The idea of tolerating intrusions gained prominence during the late 1990s and early 2000s. Major research efforts led to the development of several intrusion-tolerant algorithms and architectures. It is now possible to grasp the fundamental principles of building practical intrusiontolerant systems, the issues underlying the validation and acceptance/certification of intrusion-tolerant systems, and also the continued effective and intelligent management and operation of such systems once they are put in operation. Despite significant progress, most modern systems are still not built as intrusion-tolerant systems. There are a number of reasons for this ranging from a false sense of security, such as lack of understanding of the risk, absence of any major cyber-disaster that is publicly acknowledged, the continued and fast paced innovation in information and software construction technologies, and the perception that Intrusion Tolerance is expensive. Combined with changing technology landscape, Intrusion Tolerance is a moving target that also needs to accommodate and adapt to changes. Unlike fault tolerance, Intrusion Tolerance faces an intelligent adversary who can adapt and evolve as the system adapts and recovers. New technologies make older solutions obsolete and introduce new vulnerabilities. How to make Intrusion Tolerance an integral part of the software engineering of modern information systems? What can be done to make system developers and architects more comfortable and confident about Intrusion Tolerance technologies? How to continue to stay ahead of the increasingly sophisticated adversaries? How to enlighten and empower the practitioners to navigate the ever-changing technology landscape so that they can build systems that can be trusted, and can operate through attacks? The 4th Workshop on Recent Advances in IntrusionTolerant Systems, held in conjunction with DSN 2010, aims to provide the researchers and practitioners an intimate venue to discuss and collaborate on ground-breaking new ideas and fresh results on such issues.","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"3 1","pages":"621-622"},"PeriodicalIF":0.0000,"publicationDate":"2010-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010\",\"authors\":\"M. Correia, P. Pal\",\"doi\":\"10.1109/DSN.2010.5544420\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Design and operational vulnerabilities are accepted as inevitable in today’s complex computer systems. The distributed and networked nature of the systems that are currently in use and being developed facilitate discovery and exploitation of these flaws in increasingly new and easier ways. Intrusion Tolerance acknowledges that it is impossible to completely prevent attacks and intrusions, and that it is often impossible to accurately detect the act of intrusion and stop it early enough. Intrusion Tolerance research therefore aims to develop technologies that enable computer systems to continue to operate correctly despite attacks, and deny the attacker/intruder the success they seek. For instance, an intrusion-tolerant system may suffer partial loss of service or resources due to the attack, but it will continue to provide critical services in a degraded mode or trigger automatic mechanisms to regain and recover the compromised services and resources. Similar goals are being pursued in Survivability, Byzantine Fault Tolerance, Self-regenerative and Autonomic Systems. The idea of tolerating intrusions gained prominence during the late 1990s and early 2000s. Major research efforts led to the development of several intrusion-tolerant algorithms and architectures. It is now possible to grasp the fundamental principles of building practical intrusiontolerant systems, the issues underlying the validation and acceptance/certification of intrusion-tolerant systems, and also the continued effective and intelligent management and operation of such systems once they are put in operation. Despite significant progress, most modern systems are still not built as intrusion-tolerant systems. There are a number of reasons for this ranging from a false sense of security, such as lack of understanding of the risk, absence of any major cyber-disaster that is publicly acknowledged, the continued and fast paced innovation in information and software construction technologies, and the perception that Intrusion Tolerance is expensive. Combined with changing technology landscape, Intrusion Tolerance is a moving target that also needs to accommodate and adapt to changes. Unlike fault tolerance, Intrusion Tolerance faces an intelligent adversary who can adapt and evolve as the system adapts and recovers. New technologies make older solutions obsolete and introduce new vulnerabilities. How to make Intrusion Tolerance an integral part of the software engineering of modern information systems? What can be done to make system developers and architects more comfortable and confident about Intrusion Tolerance technologies? How to continue to stay ahead of the increasingly sophisticated adversaries? How to enlighten and empower the practitioners to navigate the ever-changing technology landscape so that they can build systems that can be trusted, and can operate through attacks? The 4th Workshop on Recent Advances in IntrusionTolerant Systems, held in conjunction with DSN 2010, aims to provide the researchers and practitioners an intimate venue to discuss and collaborate on ground-breaking new ideas and fresh results on such issues.\",\"PeriodicalId\":90852,\"journal\":{\"name\":\"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks\",\"volume\":\"3 1\",\"pages\":\"621-622\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DSN.2010.5544420\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DSN.2010.5544420","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在当今复杂的计算机系统中,设计和操作漏洞被认为是不可避免的。目前正在使用和正在开发的系统的分布式和网络化性质,促进了以越来越新的和更容易的方式发现和利用这些缺陷。入侵容忍承认完全防止攻击和入侵是不可能的,而且通常不可能准确地检测入侵行为并尽早阻止它。因此,入侵容忍研究旨在开发技术,使计算机系统在受到攻击时仍能继续正常运行,并阻止攻击者/入侵者取得他们所寻求的成功。例如,耐受入侵的系统可能会由于攻击而遭受部分服务或资源的损失,但它将继续以降级模式提供关键服务,或触发自动机制来重新获得和恢复受损的服务和资源。在生存性、拜占庭容错、自我再生和自主系统方面也在追求类似的目标。容忍入侵的想法在20世纪90年代末和21世纪初得到了突出。主要的研究工作导致了几种入侵容忍算法和体系结构的发展。现在,我们可以掌握构建实际的容错系统的基本原则、容错系统的验证和验收/认证的基础问题,以及一旦这些系统投入运行后,如何继续有效和智能地管理和运行这些系统。尽管取得了重大进展,但大多数现代系统仍然没有被构建为可容忍入侵的系统。造成这种情况的原因有很多,包括错误的安全感,比如缺乏对风险的理解,没有任何公开承认的重大网络灾难,信息和软件构建技术的持续和快节奏创新,以及认为入侵容忍是昂贵的。结合不断变化的技术环境,入侵容忍是一个不断变化的目标,也需要适应和适应变化。与容错不同,入侵容忍面对的是一个聪明的对手,它可以随着系统的适应和恢复而适应和发展。新技术使旧的解决方案过时,并引入新的漏洞。如何使入侵容忍成为现代信息系统软件工程的重要组成部分?怎样才能使系统开发人员和架构师对入侵容忍技术更放心、更有信心?如何继续领先于日益老练的对手?如何启发和授权从业者驾驭不断变化的技术环境,以便他们能够构建可信任的系统,并能够在攻击中运行?与DSN 2010联合举办的第四届耐侵入系统最新进展研讨会旨在为研究人员和从业人员提供一个亲密的场所,讨论和合作有关此类问题的突破性新想法和新结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010
Design and operational vulnerabilities are accepted as inevitable in today’s complex computer systems. The distributed and networked nature of the systems that are currently in use and being developed facilitate discovery and exploitation of these flaws in increasingly new and easier ways. Intrusion Tolerance acknowledges that it is impossible to completely prevent attacks and intrusions, and that it is often impossible to accurately detect the act of intrusion and stop it early enough. Intrusion Tolerance research therefore aims to develop technologies that enable computer systems to continue to operate correctly despite attacks, and deny the attacker/intruder the success they seek. For instance, an intrusion-tolerant system may suffer partial loss of service or resources due to the attack, but it will continue to provide critical services in a degraded mode or trigger automatic mechanisms to regain and recover the compromised services and resources. Similar goals are being pursued in Survivability, Byzantine Fault Tolerance, Self-regenerative and Autonomic Systems. The idea of tolerating intrusions gained prominence during the late 1990s and early 2000s. Major research efforts led to the development of several intrusion-tolerant algorithms and architectures. It is now possible to grasp the fundamental principles of building practical intrusiontolerant systems, the issues underlying the validation and acceptance/certification of intrusion-tolerant systems, and also the continued effective and intelligent management and operation of such systems once they are put in operation. Despite significant progress, most modern systems are still not built as intrusion-tolerant systems. There are a number of reasons for this ranging from a false sense of security, such as lack of understanding of the risk, absence of any major cyber-disaster that is publicly acknowledged, the continued and fast paced innovation in information and software construction technologies, and the perception that Intrusion Tolerance is expensive. Combined with changing technology landscape, Intrusion Tolerance is a moving target that also needs to accommodate and adapt to changes. Unlike fault tolerance, Intrusion Tolerance faces an intelligent adversary who can adapt and evolve as the system adapts and recovers. New technologies make older solutions obsolete and introduce new vulnerabilities. How to make Intrusion Tolerance an integral part of the software engineering of modern information systems? What can be done to make system developers and architects more comfortable and confident about Intrusion Tolerance technologies? How to continue to stay ahead of the increasingly sophisticated adversaries? How to enlighten and empower the practitioners to navigate the ever-changing technology landscape so that they can build systems that can be trusted, and can operate through attacks? The 4th Workshop on Recent Advances in IntrusionTolerant Systems, held in conjunction with DSN 2010, aims to provide the researchers and practitioners an intimate venue to discuss and collaborate on ground-breaking new ideas and fresh results on such issues.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Message from the DSN 2023 Program Chairs Message from the general chair CSAI-4-CPS: A Cyber Security characterization model based on Artificial Intelligence For Cyber Physical Systems Keynote I: Advances in memory state-preserving fault tolerance A Framework for Risk Assessment in Augmented Reality-Equipped Socio-Technical Systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1