2011 IEEE/IFIP 41st International Conference on Dependable Systems &Amp; Networks (DSN) 2011
DOI: 10.1109/dsn.2011.5958251
|View full text |Cite
|
Sign up to set email alerts
|

OS diversity for intrusion tolerance: Myth or reality?

Abstract: Abstract-One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity. To what extent failure diversity is observed in practical deployment depends on how diverse are the components that constitute the system. In this paper we present a study with operating systems (OS) vulnerability data from the NIST National Vulnerability Databas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
53
0
2

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 77 publications
(56 citation statements)
references
References 29 publications
1
53
0
2
Order By: Relevance
“…Garcia et al carried out a study with OSs vulnerability data from the NVD [12]. The authors analyzed the vulnerabilities of 11 OSs to find the number of vulnerabilities that occur in more than one OS.…”
Section: Related Workmentioning
confidence: 99%
“…Garcia et al carried out a study with OSs vulnerability data from the NVD [12]. The authors analyzed the vulnerabilities of 11 OSs to find the number of vulnerabilities that occur in more than one OS.…”
Section: Related Workmentioning
confidence: 99%
“…We assume that at most f pf prefilters fail of a total of N pf = f pf + k (with k > 1), and that out of the N f = 3f f + 1 filters at most f f fail. To enforce this assumption it is necessary to ensure that firewall components fail independently, which typically can be achieved with good coverage if one employs diversity [15]. A failed pre-filter can for instance modify the received traffic or generate invalid messages that are given to the filtering stage.…”
Section: System Modelmentioning
confidence: 99%
“…Second, the network diversity metric is designed [5] based on the attacking effort and their effect on the relationship between the resources. Third, the complementary metric called probabilistic network diversity security metric is modeled [6] to reflect the average attacking effort. Finally, the highlighted three metrics are validated with the various simulations under different cases.…”
Section: Related Workmentioning
confidence: 99%
“…The evolution of target defense and diversity strategies in research studies rely on intuitive notions of diversity. Hence, the impact of network diversity on the security has received the limited attention [6] which is considered as the background of the proposed research. Our proposed research deals with the detection of intrusion attack in the eclipse database with the help of Ensemble Fuzzy Association (EFA) and Cuttle Fish Algorithm (CFA).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation