PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Redundancy-based intrusion tolerance approaches moving from classical fault tolerance methods

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Borrowing from well known fault tolerant approaches based on redundancy to mask the effect of faults, redundancy-based intrusion tolerance schemes are proposed in this paper, where redundancy of ICT components is exploited as a first defense line against a subset of compromised components within the redundant set, due to cyberattacks. Features to enhance defense and tolerance capabilities are first discussed, covering diversity-based redundancy, confusion techniques, protection mechanisms, locality policies and rejuvenation phases. Then, a set of intrusion tolerance variations of classical fault tolerant schemes (including N Version Programming and Recovery Block, as well as a few hybrid approaches) is proposed, by enriching each original scheme with one or more of the previously introduced defense mechanisms. As a practical support to the system designer in making an appropriate choice among the available solutions, for each developed scheme a schematic summary is provided, in terms of resources and defense facilities needed to tolerate f value failures and k omission failures, as well as observations regarding time requirements. To provide an example of more detailed analysis, useful to set up an appropriate intrusion tolerance configuration, a trade-off study between cost and additional redundancy employed for confusion purposes is also carried out.
Rocznik
Strony
701--719
Opis fizyczny
Bibliogr. 41 poz., rys., tab., wykr.
Twórcy
  • Institute of Information Science and Technologies, National Research Council, Via G. Moruzzi 1, 56124 Pisa, Italy
  • Institute of Information Science and Technologies, National Research Council, Via G. Moruzzi 1, 56124 Pisa, Italy
  • Institute of Information Science and Technologies, National Research Council, Via G. Moruzzi 1, 56124 Pisa, Italy
Bibliografia
  • [1] Alladi, T., Chamola, V. and Zeadally, S. (2020). Industrial control systems: Cyber attack trends and counter measures, Computer Communications 155: 1–8.
  • [2] Archer, D.W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J.I., Smart, N.P. and Wright, R.N. (2018). From keys to databases—Real-world applications of secure multi-party computation, The Computer Journal 61(12): 1749–1771.
  • [3] Avizienis, A. (1985). The N-version approach to fault-tolerant software, IEEE Transactions on Software Engineering SE-11(12): 1491–1501.
  • [4] Avizienis, A., Laprie, J.-C., Randell, B. and Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing 1(1): 11–33.
  • [5] Babay, A., Tantillo, T., Aron, T., Platania, M. and Amir, Y. (2018). Network-attack-resilient intrusion-tolerant SCADA for the power grid, 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Luxemburg, Luxemburg, pp. 255–266.
  • [6] Bondavalli, A., Di Giandomenico, F. and Xu, J. (1993). A cost-effective and flexible scheme for software fault tolerance, Computer Systems: Science &Engineering 8(4): 234–244.
  • [7] Di Giandomenico, F. and Masetti, G. (2021). Basic aspects in redundancy-based intrusion tolerance, 14th International Conference on Computational Intelligence in Security for Information Systems/12th International Conference on European Transnational Educational, Bilbao, Spain, pp. 192–202.
  • [8] Di Giandomenico, F. and Strigini, L. (1990). Adjudicators for diverse-redundant components, Proceedings of the 9th Symposium on Reliable Distributed Systems, Huntsville, USA, pp. 114–123.
  • [9] Distler, T. (2022). Byzantine fault-tolerant state-machine replication from a system’s perspective, ACM Computing Surveys 54(1): 1–38.
  • [10] Dohi, T., Trivedi, K. S. and Avritzer, A. (2020). Handbook of Software Aging and Rejuvenation: Fundamentals, Methods, Applications, and Future Directions, WSPC, Singapore.
  • [11] Garcia, M., Bessani, A., Gashi, I., Neves, N. and Obelheiro, R. (2014). Analysis of operating system diversity for intrusion tolerance, Software—Practice & Experience 44(6): 735–770.
  • [12] Gashi, I., Povyakalo, A. and Strigini, L. (2016). Diversity, safety and security in embedded systems: Modelling adversary effort and supply chain risks, 12th European Dependable Computing Conference (EDCC), Gothenburg, Sweden, pp. 13–24.
  • [13] Gorbenko, A., Romanovsky, A., Tarasyuk, O. and Biloborodov, O. (2020). From analyzing operating system vulnerabilities to designing multiversion intrusion-tolerant architectures, IEEE Transactions on Reliability 69(1): 22–39.
  • [14] Haphuriwat, N. and Bier, V.M. (2011). Trade-offs between target hardening and overarching protection, European Journal of Operational Research 213(1): 320–328.
  • [15] Hardekopf, B., Kwiat, K. and Upadhyaya, S. (2001). Secure and fault-tolerant voting in distributed systems, IEEE Aerospace Conference Proceedings, Gothenburg, Sweden, pp. 1117–1126.
  • [16] Khan, M. and Babay, A. (2021). Toward intrusion tolerance as a service: Confidentiality in partially cloud-based BFT systems, 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN21), Taipei, Taiwan, pp. 14–25.
  • [17] Khraisat, A., Gondal, I., Vamplew, P. and Kamruzzaman, J. (2019). Survey of intrusion detection systems: Techniques, datasets and challenges, Cybersecurity 2(1): 1–20.
  • [18] Laprie, J.-C., Arlat, J., Beounes, C. and Kanoun, K. (1990). Definition and analysis of hardware and software-fault-tolerant architectures, Computer 23(7): 39–51.
  • [19] Littlewood, B. and Strigini, L. (2000). A discussion of practices for enhancing diversity in software designs, Technical Report DISPO LS DI TR-04 V1 1d, Centre for Software Reliability, City University, London, https://openaccess.city.ac.uk/id/eprint/275/.
  • [20] Lyu, M.R. (1995). Software Fault Tolerance, John Wiley & Sons Ltd, Hoboken.
  • [21] Majdzik, P. (2022). A feasible schedule for parallel assembly tasks in flexible manufacturing systems, International Journal of Applied Mathematics and Computer Science 32(1): 51–63, DOI: 10.34768/amcs-2022-0005.
  • [22] Mejdi, S., Messaoud, A. and Ben Abdennour, R. (2020). Fault tolerant multicontrollers for nonlinear systems: A real validation on a chemical process, International Journal of Applied Mathematics and Computer Science 30(1): 61–74, DOI: 10.34768/amcs-2020-0005.
  • [23] Nascimento, A.S., Rubira, C.M.F., Burrows, R. and Castor, F. (2013). A systematic review of design diversity-based solutions for fault-tolerant SOAs, Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering, EASE’13, Porto de Galinhas, Brazil, pp. 107–118.
  • [24] Obelheiro, R., Bessani, A., Lung, L. and Correia, M. (2006). How practical are intrusion-tolerant distributed systems?, Technical Report DI-FCUL TR 06–15, Department of Informatics, University of Lisbon, Lisbon, https://repositorio.ul.pt/handle/10451/14093.
  • [25] Puig, V., Sauter, D., Aubrun, C. and Schulte, H. (Eds) (2018). Advanced Diagnosis and Fault-Tolerant Control Methods (special section), International Journal of Applied Mathematics and Computer Science 28(2): 233–333.
  • [26] Pullum, L.L. (2001). Software Fault Tolerance Techniques and Implementation, Artech House, Inc., Canton St. Norwood.
  • [27] Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S. and Fang, B. (2020). A survey on access control in the age of Internet of Things, IEEE Internet of Things Journal 7(6): 4682–4696.
  • [28] Randell, B. (1975). System structure for software fault tolerance, IEEE Transactions on Software Engineering SE-1(2): 220–232.
  • [29] Randell, B. and Xu, J. (1994). The evolution of the recovery block concept, in M. Lyu (Ed), Software Fault Tolerance, Vol. 3, Wiley, Chichester, pp. 1–22.
  • [30] Rodriguez, M., Kwiat, K.A. and Kamhoua, C.A. (2015). Modeling fault tolerant architectures with design diversity for secure systems, IEEE Military Communications Conference (MILCOM), Tampa, USA, pp. 1254–1263.
  • [31] Saidane, A., Nicomette, V. and Deswarte, Y. (2009). The design of a generic intrusion-tolerant architecture for web servers, IEEE Transactions on Dependable and Secure Computing 6(1): 45–58.
  • [32] Scarfone, K. and Mell, P. (2010). Intrusion detection and prevention systems, in P. Stavroulakis andM. Stamp (Eds), Handbook of Information and Communication Security, Springer, Berlin/Heidelberg, pp. 177–192.
  • [33] Scott, R., Gault, J. and McAllister, D. (1985). The consensus recovery block, Total System Reliability Symposium, Gaithersburg, USA, pp. 74–85.
  • [34] Sousa, P., Bessani, A. and Obelheiro, R. (2008). The forever service for fault/intrusion removal, Proceedings of the 2nd Workshop on Recent Advances on Intrusion-Tolerant Systems, Glasgow, UK, p. 16.
  • [35] Tarraf, D.C., Kamhoua, C.A., Kwiat, K.A. and Njilla, L. (2017). Majority is not always supreme: Less can be more when voting with compromised nodes, IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, Singapore, pp. 9–12.
  • [36] Veríssimo, P.E., Neves, N.F. and Correia, M.P. (2003). Intrusion-tolerant architectures: Concepts and design, in R. Lemos et al. (Eds), Architecting Dependable Systems, Springer, Berlin, pp. 3–36.
  • [37] Vöelp, M. and Verissimo, P. (2018). Intrusion-tolerant autonomous driving, IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC), Singapore, Singapore, pp. 130–133.
  • [38] Wang, L., Ren, S., Korel, B., Kwiat, K.A. and Salerno, E. (2014). Improving system reliability against rational attacks under given resources, IEEE Transactions on Systems, Man, and Cybernetics: Systems 44(4): 446–456.
  • [39] Ylmaz, E.N. and Gänen, S. (2018). Attack detection/prevention system against cyber attack in industrial control systems, Computers & Security 77: 94–105.
  • [40] Zhang, F., Kodituwakku, H.A.D.E., Hines, J.W. and Coble, J. (2019). Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data, IEEE Transactions on Industrial Informatics 15(7): 4362–4369.
  • [41] Zhou, Y., Han, M., Liu, L., He, J.S. and Wang, Y. (2018). Deep learning approach for cyberattack detection, IEEE INFOCOM 2018—IEEE Conference on Computer Communications Workshops, Honolulu, USA, pp. 262–267.
Uwagi
PL
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023)
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-85d75754-b41c-469d-8c27-3b631db55dc6
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.