DOI QR코드

DOI QR Code

A Survey on Intrusion-Tolerant System

  • Heo, Seondong (Department of Computer Science, Korea Advanced Institute of Science and Technology) ;
  • Kim, Pyeong (Department of Computer Science, Korea Advanced Institute of Science and Technology) ;
  • Shin, Yongjoo (Department of Computer Science, Korea Advanced Institute of Science and Technology) ;
  • Lim, Jungmin (Department of Computer Science, Korea Advanced Institute of Science and Technology) ;
  • Koo, Dongyoung (Department of Computer Science, Korea Advanced Institute of Science and Technology) ;
  • Kim, Yonggon (Department of Computer Science, Korea Advanced Institute of Science and Technology) ;
  • Kwon, Ohmin (Department of Computer Science, Korea Advanced Institute of Science and Technology) ;
  • Yoon, Hyunsoo (Department of Computer Science, Korea Advanced Institute of Science and Technology)
  • Received : 2013.07.10
  • Accepted : 2013.07.30
  • Published : 2013.12.30

Abstract

Many information systems that provide useful services to people are connected to the Internet for convenience and efficiency. However, improper accessibility might make the systems susceptible to a variety of attacks. Although existing security solutions such as an intrusion detection system, intrusion prevention system, and firewalls have been designed to protect against such attacks, it is impossible to block all kinds of attacks. Furthermore, most of the proposed solutions require information about attacks for efficient prevention. Research on intrusion-tolerant systems (ITSs) have been conducted in order to continue providing proper services in threatening environments. The purpose of an ITS is to survive against every intrusion, rather than to prevent them. In this paper, previous studies on ITS are introduced and classified according to the centric scheme as middleware-based ITS, hardware-based ITS, and recovery-based ITS. Recent research focusing on adaptive transformation schemes is also introduced.

Keywords

References

  1. A. H. Fares, M. I. Sharawy, and H. H. Zayed, "Intrusion detection: supervised machine learning," Journal of Computing Science and Engineering, vol. 5, no. 4, pp. 305-313, 2011. https://doi.org/10.5626/JCSE.2011.5.4.305
  2. W. Park and C. Park, "Data firewall: a TPM-based security framework for protecting data in thick client mobile environment," Journal of Computing Science and Engineering, vol. 5, no. 4, pp. 331-337, 2011. https://doi.org/10.5626/JCSE.2011.5.4.331
  3. J. Reynolds, J. Just, E. Lawson, L. Clough, R. Maglich, and K. Levitt, "The design and implementation of an intrusion tolerant system," in Proceedings of International Conference on Dependable Systems and Networks, Washington, DC, 2002, pp. 258-290.
  4. J. Chong, P. Pal, M. Atigetchi, P. Rubel, and F. Webber, "Survivability architecture of a mission critical system: the DPASA example," in Proceedings of the 21st Annual Computer Security Applications Conference, Tucson, AZ, 2005, pp. 495-504.
  5. P. Pal, F. Webber, and R. Schantz, "The DPASA survivable JBI: a high-water mark in intrusion-tolerant systems," in Proceedings of the 1st Workshop Recent Advances on Intrusion-Tolerant Systems, Lisbon, Portugal, 2007.
  6. D. Arsenault, A. Sood, and Y. Huang, "Secure, resilient computing clusters: self-cleansing intrusion tolerance with hardware enforced security (SCIT/HES)," in Proceedings of the 2nd International Conference on Availability, Reliability and Security, Vienna, Austria, 2007, pp. 343-350.
  7. J. Knight, D. Heimbigner, A. L. Wolf, A. Carzaniga, J. Hill, P. Devanbu, and M. Gertz, "The Willow architecture: comprehensive survivability for large-scale distributed applications," Department of Computer Science, University of Colorado at Boulder, Boulder, CO, Technical report, 2001.
  8. A. Valdes, M. Almgren, S. Cheung, Y. Deswarte, B. Dutertre, J. Levy, H. Saidi, V. Stavridou, and T. E. Uribe, "An architecture for adaptive intrusion-tolerant server," in Proceedings of Security Protocols Workshop, Cambridge, UK, 2002, pp. 158-178.
  9. M. Cukier, J. Lyons, P. Pandey, H. V. Ramasamy, W. H. Sanders, P. Pal, F. Webber, R. Schantz, J. Loyall, R. Watro, M. Atighetchi, and J. Gossett, "Intrusion tolerance approaches in ITUA," in Supplement of 2001 International Conference on Dependable Systems and Networks, Goteborg, Sweden, 2001.
  10. F. Wang, F. Gong, C. Sargor, K. Goseva-Popstojanova, K. S. Trivedi, and F. Jou, "SITAR: a scalable intrusion tolerance architecture for distributed services," in Proceedings of the Second IEEE/SMC Information Assurance Workshop, West Point, NY, 2001, pp. 38-45.
  11. P. E. Verissimo, N. F. Neves, C. Cachin, J. Poritz, D. Powell, Y. Deswarte, R. Stroud, and I. Welch, "Intrusion-tolerant middleware: the road to automatic security," IEEE Security and Privacy, vol. 4, no. 4, pp. 54-62, 2006.
  12. K. C. Chen, "Machine-to-machine communications for healthcare," Journal of Computing Science and Engineering, vol. 6, no. 2, pp. 119-126, 2012. https://doi.org/10.5626/JCSE.2012.6.2.119
  13. S. B. E. Raj and G. Varghese, "Analysis of intrusion-tolerant architectures for Web servers," in Proceedings of the International Conference on Emerging Trends in Electrical and Computer Technology, Tamil Nadu, India, 2011, pp. 998-1003.
  14. A. Saidane, V. Nicomette, and Y. Deswarte, "The design of a generic intrusion-tolerant architecture for Web servers," IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 1, pp. 45-58, 2008.
  15. Y. Huang, D. Arsenault, and A. Sood, "Incorruptible system self-cleansing for intrusion tolerance," in Proceedings of the 25th IEEE International Performance, Computing, and Communications Conference, Phoenix, AZ, 2006, pp. 493-496.
  16. Q. Nguyen and A. Sood, "Realizing S-reliability for services via recovery-driven intrusion tolerance mechanism," in Proceedings of IEEE International Conference on Dependable Systems and Networks Workshops, Chicago, IL, 2010, pp. 176-181.
  17. Y. Huang and A. Sood, "Self-cleansing systems for intrusion containment," in Workshop on Self-Healing, Adaptive, and Self-Managed Systems (SHAMAN), New York, NY, 2002.
  18. A. K. Bangalore and A. Sood, "Securing Web servers using self-cleansing intrusion tolerance (SCIT)," in Proceedings of the 2nd International Conference on Dependability, Athens, Greece, 2009, pp. 60-65.
  19. J. Lim, Y. Kim, D. Koo, S. Lee, S. Doo, and H. Yoon, "A novel adaptive cluster transformation (ACT)-based intrusion tolerant system for hybrid information technology," Journal of Supercomputing, 2013. http://dx.doi.org/10.1007/s11227-013-0928-5.
  20. Y. Kim, J. Lim, S. Doo, and H. Yoon, "The design of adaptive intrusion tolerant system (ITS) based on historical data," in Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, London, UK, 2012, pp. 662-667.
  21. S. Heo, Y. Kim, J. Lim, and H. Yoon, "A design of a novel intrusion tolerant system through effective resource transformation," Telecommunications Review, vol. 22, no. 6, pp. 913-921, 2012.
  22. S. Heo, J. Lim, M. Lee, S. Lee, and H. Yoon, "A novel intrusion tolerant system based on adaptive recovery scheme (ARS)," in IT Convergence and Security 2012, Heidelberg, Germany: Springer, 2013, pp. 71-78.
  23. H. Kim, J. Lim, and H. Yoon, "A design of a novel intrusion tolerant system using virtual machine image analysis and secure exposure policy," Telecommunications Review, vol. 22, no. 6, pp. 904-912, 2012.
  24. D. Pham and A. Sood, "An intrusion tolerance approach to enhance single sign on server protection," in Proceedings of the 3rd International Conference on Dependability, Venice, Italy, 2010, pp. 98-103.

Cited by

  1. Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks vol.7, pp.11, 2017, https://doi.org/10.3390/app7111186