Intrusion-Avoidance via System Diversity

The paper discusses a generic intrusion-avoidance architecture allowing the system architects to decrease the risk of intrusions. The architecture employs software diversity at various system levels and dynamically reconfigures the deployment environment to avoid intrusions. This solution reduces the so-called system’s days-of-risk which is a period of an increased security risk between the time when a vulnerability is publicly disclosed to the time when a patch is available to fix it. To select the less vulnerable system configuration we propose metrics estimating security risks by accounting a number of not-fixed vulnerabilities and their severity.

[1]  Miguel Correia,et al.  The Middleware Architecture of MAFTIA: A Blueprint , 2000 .

[2]  Richard Ford,et al.  Role Comparison Report – Web Server Role , 2005 .

[3]  Rajkumar Buyya,et al.  Cloud Computing Principles and Paradigms , 2011 .

[4]  Arun K. Sood,et al.  Realizing S-Reliability for services via recovery-driven intrusion tolerance mechanism , 2010, 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W).

[5]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[6]  Christian Cachin,et al.  Secure INtrusion-Tolerant Replication on the Internet , 2002, Proceedings International Conference on Dependable Systems and Networks.

[7]  Alysson Neves Bessani,et al.  OS diversity for intrusion tolerance: Myth or reality? , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).