首页> 外文期刊>IEICE transactions on information and systems >Designing and Implementing a Diversity Policy for Intrusion-Tolerant Systems
【24h】

Designing and Implementing a Diversity Policy for Intrusion-Tolerant Systems

机译:设计和实施容错系统的多样性策略

获取原文
           

摘要

Research on intrusion-tolerant systems (ITSs) is being conducted to protect critical systems which provide useful information services. To provide services reliably, these critical systems must not have even a single point of failure (SPOF). Therefore, most ITSs employ redundant components to eliminate the SPOF problem and improve system reliability. However, systems that include identical components have common vulnerabilities that can be exploited to attack the servers. Attackers prefer to exploit these common vulnerabilities rather than general vulnerabilities because the former might provide an opportunity to compromise several servers. In this study, we analyze software vulnerability data from the National Vulnerability Database (NVD). Based on the analysis results, we present a scheme that finds software combinations that minimize the risk of common vulnerabilities. We implement this scheme with CSIM20, and simulation results prove that the proposed scheme is appropriate for a recovery-based intrusion tolerant architecture.
机译:为了保护提供有用信息服务的关键系统,正在进行入侵容忍系统(ITS)的研究。为了可靠地提供服务,这些关键系统甚至必须没有单点故障(SPOF)。因此,大多数ITS使用冗余组件来消除SPOF问题并提高系统可靠性。但是,包含相同组件的系统具有共同的漏洞,可以利用这些漏洞来攻击服务器。攻击者更喜欢利用这些常见漏洞而不是一般漏洞,因为前者可能会提供机会破坏多个服务器。在这项研究中,我们分析了来自国家漏洞数据库(NVD)的软件漏洞数据。根据分析结果,我们提出了一种方案,该方案可以找到将常见漏洞的风险降至最低的软件组合。我们用CSIM20实现了该方案,仿真结果证明了该方案适用于基于恢复的入侵容忍体系结构。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号