首页> 外文会议>Cordless Office >Evaluating the security threat of firewall data corruption caused by instruction transient errors
【24h】

Evaluating the security threat of firewall data corruption caused by instruction transient errors

机译:评估指令瞬时错误导致的防火墙数据损坏的安全威胁

获取原文
获取原文并翻译 | 示例

摘要

This paper experimentally evaluates and models the error-caused security vulnerabilities and the resulting security violations of two Linux kernel firewalls: IPChains and Netfilter. There are two major aspects to this work: to conduct extensive error injection experiments on the Linux kernel and to quantify the possibility of error-caused security violations using a SAN (Stochastic Activity Network) model. The error injection experiments show that about 2% of errors injected into the firewall code segment cause security vulnerabilities. Two types of error-caused security vulnerabilities are distinguished: temporary, which disappear when the error disappears, and permanent, which persist even after the error is removed, as long as the system is not rebooted. Results from simulating the SAN model indicate that under an error rate of 0.1 error/day during a 1-year period in a networked system protected by 20 firewalls, 2 machines (on the average) will experience security violations. This indicates that error-caused security vulnerabilities can be a non-negligible source of a security threats to a highly secure system.
机译:本文通过实验评估和建模了由错误引起的安全漏洞以及由此产生的两个Linux内核防火墙IPChains和Netfilter的安全违规行为。这项工作有两个主要方面:在Linux内核上进行广泛的错误注入实验,并使用SAN(随机活动网络)模型量化由错误引起的违反安全性的可能性。错误注入实验表明,注入到防火墙代码段中的错误中约有2%会导致安全漏洞。区分了两种类型的由错误引起的安全漏洞:临时的(在错误消失后消失)和永久的(即使在消除错误后仍保持),只要不重新启动系统即可。从SAN模型的模拟结果表明,在受20个防火墙保护的网络系统中,在1年期间内,每天的错误率为0.1错误/天,平均有2台计算机会遇到安全违规情况。这表明由错误引起的安全漏洞可能是高度安全系统的安全威胁的不可忽略的来源。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号