2013
DOI: 10.1002/spe.2180
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of operating system diversity for intrusion tolerance

Abstract: One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity. To what extent failure diversity is observed in practical deployment depends on how diverse are the components that constitute the system. In this paper, we present a study with operating system's (OS's) vulnerability data from the NIST National Vulnerability Database (NV… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
35
0
2

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
2

Relationship

3
5

Authors

Journals

citations
Cited by 65 publications
(43 citation statements)
references
References 39 publications
(46 reference statements)
1
35
0
2
Order By: Relevance
“…Compared with a single version, for ( < 0.5 using three diverse versions reduces the probability of integrity breach but increases the probability of confidentiality breach: the well known, common trade-off between confidentiality and integrity. As may be expected by analogy with 2-out-of-3 voted systems, with q>0.5 diversity increases risk 7 .…”
Section: With Three Versions (One Per Channel)supporting
confidence: 52%
See 1 more Smart Citation
“…Compared with a single version, for ( < 0.5 using three diverse versions reduces the probability of integrity breach but increases the probability of confidentiality breach: the well known, common trade-off between confidentiality and integrity. As may be expected by analogy with 2-out-of-3 voted systems, with q>0.5 diversity increases risk 7 .…”
Section: With Three Versions (One Per Channel)supporting
confidence: 52%
“…an early survey and references [3]; a more recent one in [7]). Apart from the various proposals of architectures using them (usually with limited and often simplistic modelling; see the discussion in [3]) there is empirical work on the effectiveness of diversity and defence in depth with specific products [8], [9], [7], [10] distribution of the number of flawed versions in the system is hypergeometric.…”
Section: ; > < ; ? mentioning
confidence: 99%
“…Interoperability can be leveraged to increase the diversity of the control platform element. Indeed, diversity increases the system robustness by reducing the probability of common faults, such as software faults [210].…”
Section: Eastbound and Westboundmentioning
confidence: 99%
“…If anything wrong happens with the network, operators should be able to safely figure out the root cause of the problem and put the network to work on a secure operation mode as fast as possible. Additionally, techniques to tolerate faults and intrusions, such as state machine replication [515], proactivereactive recovery [516], and diversity [210], can be added to control platforms for increasing the robustness and security properties by automatically masking and removing faults. Put differently, SDN controllers should be able to resist against different types of events (e.g., power outages, network disruption, communication failures, network partitioning) and attacks (e.g., DDoS, resource exhaustion) [357], [213].…”
Section: Flow Aggregationmentioning
confidence: 99%
“…-phpBB (phpBB.com) -a widely used forum solution. Table I shows the total number of benign demands (crawling actions) and successful attacks 8 for each application. Each IDS inspected the same traffic for each application.…”
Section: Experimental Setup and Analysis Methodologymentioning
confidence: 99%