Seminarsonly.com

Custom Search

>>

 

Are you interested in this topic.Then mail to us immediately to get the full report.

email :- contactv2@gmail.com

 

 

 

Custom Search

 

 

 

 

 

 

 

 

 
Intrusion Tolerance

 Abstract of Intrusion Tolerance

The notion of handling— react, counteract, recover, mask— a wide set of faults encompassing intentional and malicious faults (intrusions), which may lead to failure of the system security properties if nothing is done to counter their effect on the system state.

• Instead of trying to prevent every single intrusion, these are allowed, but tolerated.

• The system has the means to trigger mechanisms that prevent the intrusion from generating a system failure.

• A new approach has slowly emerged during the past decade, and gained impressive momentum recently: intrusion tolerance.

That is, the notion of tolerance to a wide set of faults encompassing intentional and malicious faults (we may collectively call them intrusions), which may lead to failure of the system security properties if nothing is done to react, counteract, recover, mask, etc., the effect of intrusions on the system state. In short, instead of trying to prevent every single intrusion, the latter are allowed, but tolerated: the system has the means to trigger mechanisms that prevent the intrusion from generating a system failure.

 Traditionally, security has involved either:
– Trusting that certain attacks will not occur
– Removing vulnerabilities from initially fragile software
– Preventing attacks from leading to intrusions

 In contrast, the tolerance paradigm in security:
– Assumes that systems remain to a certain extent vulnerable
– Assumes that attacks on components or sub-systems can happen and some will be successful
– Ensures that the overall system nevertheless remains secure and Operational

Methods Involved

In the process of intrusion tolerance we come across many stages that directly or indirectly do help in making the process Efficient and Effective.

1. Fault Models.
2. Classic Methodology.
3. Error Processing.
4. Fault Treatment.

FAULT MODELS

Attacks, Vulnerabilities, Intrusions

• Intrusion

– An externally induced, intentionally malicious, operational fault, causing an erroneous state in the system.

• An intrusion has two underlying causes:

Vulnerability

– Malicious or non-malicious weakness in a computing or communication system that can be exploited with malicious intention

Attack

– Malicious intentional fault introduced in a computing or comm’s system, with the intent of exploiting vulnerability in that system
– Without attacks, vulnerabilities are harmless
– Without vulnerabilities, there cannot be successful attacks

• Hence:

Attack + vulnerability intrusion error failure
– A specialization of the generic “fault, error, failure” sequence


Faults in Cascade:

• b is outsider with respect to D:

– Not authorized to perform any object operations On D

• a is insider with respect to D:
– His privilege (A) intersects D
– authorized to perform some specified

Object-operations

• b performs outsider intrusion on D
– Privilege theft
• a performs insider intrusion on D
– Privilege abuse
– Maybe combined with privilege theft
• b usurps identity of a
– Privilege usurpation

Intrusion tolerance is one of the effective approaches to handle the intrusion and punish the intruder under the law. Using the Intrusion tolerant measures and protocols, though intrusion takes place it can certainly be tolerated

References

1) Aducent Inc


You may also like this : BlackBerry Technology,Facebook Thrift,Capacitive And Resistive Touch Systems,Cyber Crime,Enhancing LAN Using Cryptography and Other Modules,Generic Access Network,Green Computing, Breaking the Memory Wall in MonetDB, Bluejacking, Zettabyte FileSystem, NVIDIA Tesla Personal Supercomputer, Airborne Internet, Capacitive And Resistive Touch Systems, Security Features of ATM

<<back


copyright © 2006 V2 Computers E-mail :- contactv2@gmail.com