Resilient infrastructure for network security

Present-day network security mechanisms are based on preventing attacks and responding to them as they occur. In the time before a response is implemented the attack is generally free to damage the system. Because responses are usually human driven, this time is long and the damage can be large. One way to minimize this damage is to create "resilient infrastructure." This is infrastructure that automatically slows attacks, so buying time for a human response. This article argues the case for resilient infrastructure in network security.

[1]  Danilo Bruschi,et al.  Disarming offense to facilitate defense , 2001, NSPW '00.

[2]  Vern Paxson,et al.  How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.

[3]  Stephanie Forrest,et al.  Automated response using system-call delays , 2000 .

[4]  Stephanie Forrest,et al.  An immunological model of distributed detection and its application to computer security , 1999 .

[5]  Biswanath Mukherjee,et al.  A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[6]  Danilo Bruschi,et al.  AngeL: a tool to disarm computer systems , 2001, NSPW '01.

[7]  Stephanie Forrest,et al.  Operating system stability and security through process homeostasis , 2002 .

[8]  Stefan Axelsson,et al.  The base-rate fallacy and its implications for the difficulty of intrusion detection , 1999, CCS '99.

[9]  Matthew M. Williamson,et al.  Implementing and Testing a Virus Throttle , 2003, USENIX Security Symposium.

[10]  Matthew M. Williamson,et al.  Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[11]  Frederick B. Cohen,et al.  A short course on computer viruses (2nd ed.) , 1994 .

[12]  Matthew M. Williamson Design, implementation and test of an email virus throttle , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[13]  Jelena Mirkovic,et al.  Attacking DDoS at the source , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[14]  Eric Rescorla Security Holes . . . Who Cares? , 2003, USENIX Security Symposium.