Intrusion detection research has so far concentrated on techniques that effectively identify the malicious behaviors. No assurance can be assumed once the system is compromised. Intrusion tolerance, however, focuses on providing minimal level of services, even when some components have been partially compromised. The challenges here are how to take advantage of fault tolerant techniques in the intrusion tolerant system context and how to deal with possible unknown attacks and compromised components so as to continue providing the service. This paper presents our work on applying one important fault tolerance technique, acceptance testing, for building scalable intrusion tolerant systems. First, we propose a general methodology for designing acceptance testing. An Acceptance Monitor architecture is proposed to apply various tests for detecting the compromises based on the impact of the attacks. Second, we make a comprehensive vulnerability analysis on typical commercial‐off‐the‐shelf (COTS) Web servers. Various acceptance testing modules are implemented to show the effectiveness of the proposed approach. By utilizing the fault tolerance techniques on intrusion tolerance system, we provide a mechanism for building reliable distributed services that are more resistant to both known and unknown attacks. Copyright © 2003 John Wiley & Sons, Ltd.
[1]
Rong Wang.
Intrusion Tolerant Systems Characterization and Acceptance Monitor Design
,
2001
.
[2]
E. Amoroso.
Intrusion Detection
,
1999
.
[3]
Feiyi Wang,et al.
SITAR: a scalable intrusion-tolerant architecture for distributed services
,
2003,
Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[4]
David Gelernter,et al.
Generative communication in Linda
,
1985,
TOPL.
[5]
Lori Pollock,et al.
Issues and experiences in implementing a distributed tuplespace
,
1997
.
[6]
Ronald L. Rivest,et al.
The MD5 Message-Digest Algorithm
,
1992,
RFC.
[7]
Ken Arnold,et al.
JavaSpaces¿ Principles, Patterns, and Practice
,
1999
.
[8]
Sandeep Kumar,et al.
A Software Architecture to Support Misuse Intrusion Detection
,
1995
.
[9]
William Stallings,et al.
Cryptography and Network Security: Principles and Practice
,
1998
.
[10]
Hermann Kopetz,et al.
Fault tolerance, principles and practice
,
1990
.