Preview

Intrusion Tolerance Article

Better Essays
Open Document
Open Document
1988 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Intrusion Tolerance Article
An Overview of Intrusion Tolerance Techniques

Introduction: Intrusion means an act of compromising a system. Intrusion prevention protects the system from compromising. Intrusion detection detects either failed attempts to compromise the system or successful attempts. Intrusion recovery is the steps need to be taken to recover the system (such as restoring from backups) after a system has been compromised in a security incident [1]. Intrusion tolerance include reacting, counteracting, recovering, masking a wide set of faults encompassing intentional and malicious faults (intrusions), which may lead to failure of the system security properties if nothing is done to counter their effect on the system state. Instead of trying to prevent every single intrusion, these are allowed and tolerated. The intrusion tolerant system will trigger mechanisms that prevent the intrusion from generating a system failure The common approach taken today for securing our critical systems is to build a layers of defenses around them using security technologies, such as firewalls and access control mechanisms. The machines inside the security layer are assumed (trusted) to be correct. The goal is also to protect the machines inside from attackers on the outside. While critical systems may have operated exclusively on private networks in the past, thus affording them some degree of protection from external attackers. Many of them are now connected to the Internet and are vulnerable to a wide range of threats that may not have been considered threats when the systems were originally designed. Given that thousands of machines are compromised on the Internet each day, it seems likely that some of the attacks will be able to breach the security walls of even those critical systems specifically designed with security in mind. In addition, insider attacks, such as from disgruntled employees, who take advantage of existing security vulnerabilities, are becoming more and more common and



References: 1) Intrusion Tolerance Via Network Layer Controls, Dick O’Brien, Rick Smith, Tammy Kappel and Clint Bitzer, Secure Computing Corp. 2) P. E. Verissimo, N. F. Neves, and M. P. Correia. Intrusion-tolerant architectures: Concepts and design. In R. Lemos, C. Gacek, and A. Romanovsky, editors, Architecting Dependable Systems, volume 2677. 2003 3) Fault tolerant computing system, James A Katzman 4) Byzantine Fault Tolerance, from Theory to Reality by Kevin Driscoll1, Brendan Hall1, Håkan Sivencrona2, Phil Zumsteg. 5) Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery by Paulo Sousa, Member, IEEE, Alysson Neves Bessani, Miguel Correia, Member, IEEE, Nuno Ferreira Neves, Member, IEEE, Paulo Verissimo, Fellow, IEEE. 6) Analysis of operating system diversity for intrusion tolerance Miguel Garcia1,*,†, Alysson Bessani1, Ilir Gashi2, Nuno Neves1 and Rafael Obelheiro3 7) A Detailed Review of Fault-Tolerance Techniques in Distributed System by Sanjeev Sharma, Sanjey Bansal, Ishita Tiwari 8) OS Diversity for Intrusion Tolerance: Myth or Reality? By Miguel Garcia∗, Alysson Bessani∗, Ilir Gashi†, Nuno Neves∗ and Rafael Obelheiro‡ ∗LaSIGE, University of Lisbon, Faculty of Sciences – Lisbon, Portugal †Center for Software Reliability.

You May Also Find These Documents Helpful

  • Good Essays

    Designing a fault-tolerant system can be done at different levels of the software stack. We call general purpose the approaches that detect and correct the failures at a given level of that stack, masking them entirely to the higher levels (and ultimately to the end-user, who eventually see a correct result, despite the occurrence of failures). General-purpose approaches can target specific types of failures (e.g. message loss, or message corruption), and let other types of failures hit higher levels of the software stack. In this section, we discuss a set of well-known and recently developed protocols to provide general-purpose fault tolerance for a large set of failure types, at different levels of the software stack, but always below the…

    • 1211 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    References: Adams, Karen, (2012). Types of Intrusion Prevention Systems. Retrieved September 6, 2012 from http://www.ehow.com/info_8039841_types-intrusion-prevention-systems.html…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    INDP Final Project

    • 1793 Words
    • 4 Pages

    References: Banathy, A., Panozzo, G., Gordy, A., & Senese, J. (2013, July). A Layered Approach to Network Security. Retrieved from http://www.industrial-ip.org/en/knowledge-center/solutions/security-and-compliance/a-layered-approach-to-network-security…

    • 1793 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Cmgt 554 Week4

    • 1618 Words
    • 7 Pages

    Iniewski, K., McCrosky, C., & Minoli, D. (2008). Network infrastructure and architecture: Designing high-availability networks. Retrieved from The University of Phoenix eBook Collection database.…

    • 1618 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    As relates to your selected scenario, give a brief 100- to 200-word overview of the company.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There are two kinds of systems that people can utilize when setting up a network. They can use a distributed system or the other kind of system called a centralized system. In this paper we will find out what can happen as far as the failures in these systems and what if anything can be done to fix these systems when they fail.…

    • 726 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    3) Authentication: Verifying the identity of the person or device attempting to access the system.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions:…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure …

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Powerful Essays

    2. Provide continuous intrusion detection and surveillance at the restricted area boundary and actual resource. Use posted sentries when IDS is not installed or not operational.…

    • 19110 Words
    • 62 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays