An architecture for an adaptive intrusion-tolerant server

被引:0
|
作者
Valdes, A [1 ]
Almgren, M [1 ]
Cheung, S [1 ]
Deswarte, Y [1 ]
Dutertre, B [1 ]
Levy, J [1 ]
Saïdi, H [1 ]
Stavridou, V [1 ]
Uribe, TE [1 ]
机构
[1] SRI Int, Syst Design Lab, Menlo Pk, CA 94025 USA
来源
SECURITY PROTOCOLS | 2004年 / 2845卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We describe a general architecture for intrusion-tolerant enterprise systems and the implementation of an intrusion-tolerant Web server as a specific instance. The architecture comprises functionally redundant COTS servers running on diverse operating systems and platforms, hardened intrusion-tolerance proxies that mediate client requests and verify the behavior of servers and other proxies, and monitoring and alert management components based on the EMERALD intrusion-detection framework. Integrity and availability are maintained by dynamically adapting the system configuration in response to intrusions or other faults. The dynamic configuration specifies the servers assigned to each client request, the agreement protocol used to validate server replies, and the resources spent on monitoring and detection. Alerts trigger increasingly strict regimes to ensure continued service, with graceful degradation of performance, even if some servers or proxies are compromised or faulty. The system returns to less stringent regimes as threats diminish. Servers and proxies can be isolated, repaired, and reinserted without interrupting service.
引用
收藏
页码:158 / 177
页数:20
相关论文
共 50 条
  • [1] Intrusion-tolerant server architecture for survivable services
    Min, YJ
    JOURNAL OF SUPERCOMPUTING, 2005, 33 (1-2): : 93 - 102
  • [2] Intrusion-tolerant server architecture for survivable services
    Min B.J.
    Journal of Supercomputing, 2005, 33 (01): : 93 - 102
  • [3] Intrusion-Tolerant Server Architecture for Survivable Services
    Byoung Min Joon
    The Journal of Supercomputing, 2005, 33 (1) : 93 - 102
  • [4] An architecture for adaptive intrusion-tolerant applications
    Pal, Partha
    Rubel, Paul
    Atighetchi, Michael
    Webber, Franklin
    Sanders, William H.
    Seri, Mouna
    Ramasamy, HariGovind
    Lyons, James
    Courtney, Tod
    Agbaria, Adnan
    Cukier, Michel
    Gossett, Jeanna
    Keidar, Idit
    SOFTWARE-PRACTICE & EXPERIENCE, 2006, 36 (11-12): : 1331 - 1354
  • [5] An approach for availability evaluation of intrusion-tolerant server architectures
    Shi, Tingjun
    Zhao, Jinfeng
    Sang, Xia
    Yin, Xinchun
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 252 - 258
  • [6] Adaptation policies for web server intrusion-tolerant system
    Im, EG
    In, HP
    Choi, DS
    Song, YH
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (08) : 3462 - 3465
  • [7] Dependability and performance evaluation of intrusion-tolerant server architectures
    Gupta, V
    Lam, V
    Ramasamy, HV
    Sanders, WH
    Singh, S
    DEPENDABLE COMPUTING, 2003, 2847 : 81 - 101
  • [8] Intrusion-tolerant system design for web server survivability
    Choi, DS
    Im, EG
    Lee, CW
    INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 124 - 134
  • [9] An intrusion-tolerant COTS-based server on heterogeneous platforms
    Wang, HQ
    Rong, X
    Du, Y
    Li, BY
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2644 - 2649
  • [10] The Design of a Generic Intrusion-Tolerant Architecture for Web Servers
    Saidane, Ayda
    Nicomette, Vincent
    Deswarte, Yves
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (01) : 45 - 58