首页> 外文学位 >Realizing Cyber Resilience with Hybrid Intrusion Tolerance Architectures.
【24h】

Realizing Cyber Resilience with Hybrid Intrusion Tolerance Architectures.

机译:利用混合入侵容忍体系结构实现网络弹性。

获取原文
获取原文并翻译 | 示例

摘要

The current approach to security is based on perimeter defense and relies on firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS). These systems require a priori information about attack patterns and system vulnerabilities. With ever-increasing bandwidth and thousands of unique malware signatures coming out every day, it is becoming impractical to prevent every intrusion. And so, intrusion tolerance assumes that intrusions are inevitable and focuses efforts on minimizing the impact of intrusions. The variety and complexity of cyber-attacks is increasing. Various industry data breach investigation reports suggest that customized malware are difficult to detect and data ex-filtration often occurs over a period of days, weeks and months. The attackers' strong motivation leads to organized and targeted cyber-attacks.;The current intrusion detection and prevention approaches are reactive in nature and inadequate to prevent all attacks. Given the clear need to design intrusion tolerant architectures, my work focuses on extension and application of recovery driven intrusion tolerance systems that make the attacker work harder by reducing the server's exposure time to the internet. This approach relies on using hybrid architectures that combine reactive and proactive systems to protecting the cyber infrastructure. My research framework entails a) Proposing hybrid architectures founded on SCIT, a recovery driven intrusion tolerance approach; b) determining the influencing factors of each hybrid strategy and studying the impact of their variations within the context of an integrated intrusion defense strategy; c) defining economic models to assess the efficacy of proposed hybrid architectures; d) using mathematical models to evaluate proposed hybrid architectures and assess optimal operational parameters; and e) validating research using test bed experiments and simulations outlining impact of proposed architectures on system attack surface and intruder work factor.;To system architects and executive management alike, this work can constitute as the basis for making informed decisions while piling layers of security as part of defense-in-depth strategy.
机译:当前的安全方法基于外围防御,并依赖于防火墙,入侵检测系统(IDS)和入侵防御系统(IPS)。这些系统需要有关攻击模式和系统漏洞的先验信息。随着带宽的不断增加和每天涌现出数千个独特的恶意软件签名,防止每次入侵都变得不切实际。因此,入侵容忍假设入侵是不可避免的,并将精力集中在最小化入侵的影响上。网络攻击的多样性和复杂性正在增加。各种行业数据泄露调查报告表明,定制的恶意软件难以检测,并且数据泄露通常在几天,几周和几个月的时间内发生。攻击者的强烈动机导致了有组织的针对性网络攻击。当前的入侵检测和防御方法本质上是被动的,不足以阻止所有攻击。鉴于设计防入侵架构的明确需求,我的工作重点是恢复驱动的防入侵系统的扩展和应用,这些系统通过减少服务器在Internet上的暴露时间来使攻击者更加努力地工作。这种方法依赖于使用混合体系结构,该体系结构将反应性系统和主动性系统相结合来保护网络基础设施。我的研究框架包括:a)提出基于SCIT的混合架构,这是一种恢复驱动的入侵容忍方法; b)确定每种混合策略的影响因素,并在集成入侵防御策略的背景下研究其变化的影响; c)定义经济模型以评估提议的混合架构的功效; d)使用数学模型评估提议的混合架构并评估最佳运行参数; e)使用试验台实验和仿真来验证研究,概述拟议架构对系统攻击面和入侵者工作因素的影响。对于系统架构师和执行管理人员而言,这项工作可以作为在堆积安全层时做出明智决策的基础作为纵深防御策略的一部分。

著录项

  • 作者

    Nagarajan, Ajay.;

  • 作者单位

    George Mason University.;

  • 授予单位 George Mason University.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2017
  • 页码 201 p.
  • 总页数 201
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号