Sie sind auf Seite 1von 19

(NETWORK SECURITY)

SETHU ROLL NO: 26

LARGE CLASS OF ATTACKS

NON- REGISTERED REGISTERED USERS USERS

INTRUSION TARGETS:
INFORMATION CONFIDENTIALITY INFORMATION INTEGRITY SERVICE AVAILABILITY

Outsider vs. Insider intrusions


b is outsider with respect to D: Not authorized to perform any object operations On D a is insider with respect to D: His privilege (A) intersects D authorized to perform some specified Object-operations b performs outsider intrusion on D Privilege theft a performs insider intrusion on D Privilege abuse Maybe combined with privilege theft b usurps identity of a Privilege usurpation

Intrusion- tolerant distributes system is a system in which intrusion into a part will not endanger confidentiality , integrity and availability Instead of trying to prevent every single intrusion, the intrusions are allowed but tolerated

System has the means to trigger mechanisms that prevent intrusion from generating a system failure
Vulnerability+ Attacks Successful Attacks Faults Errors

Error Processing

No System Failure

Suitable for distributed systems


Eg: Consider a distributed system which involves standard workstations and intrusiontolerant distributed servers

Each server is constituted by a set of untrusted sites

Intrusion into the distributed server sites should not endanger confidentiality and integrity of sensitive data and should not produce any denial of service

To be successful, an attacker would have to intrude into a majority of the server sites or bribe a majority of the site administrators

FRS technique F Fragmentation(cutting all sensitive information into fragments) R Redundancy(Replication) S Scattering(distributing the fragments among different sites) Resource consuming for enemy Helps in intrusion detection Eg : Consider a user whose file is to be made intrusion tolerant

Here , the files are scattered in different sites

Fault Models Classical Methodology Error Processing Fault Treatment

Basic concepts: Vulnerability Attack Intrusions

Vulnerability

Attack

Intrusion

Error

Failure

AVI Sequence Vulnerability + Attack Intrusion Error Failure

Attack prevention Attack removal Vulnerability prevention Intrusion Prevention

Vulnerability removal

Error detection Error recovery

Diagnosis

Isolation

Reconfiguration

(Malicious and Accidental Fault Tolerance for Internet Applications)

(Organically Assured & Survivable Information Systems)

Security, being an issue that cannot be taken lightly, any circumstance where in an immediate action has to be taken place to keep up the security, tolerance approach is the one effective. Intrusion tolerance is one of the effective approaches to handle the intrusions. Using the Intrusion tolerant measures and protocols, though intrusion takes place it can certainly be tolerated.

[1] Blain L. and Deswarte Y., An intrusion-tolerant security server for an open

distributed system, Proceedings of the European Symposium in Computer Security


(ESORICS 90), Toulouse (France), October 1990 [2] CCITT, The Directory, Recommendation X500, December 88. [3] Denning D.E., An intrusion-detection model", Proceedings of the 1986 IEEE Symposium on Security and Privacy, Oakland (Ca.), April 1986 [4] El Gamal T., A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory, July 1985

[5] Fiat A. and Shamir A., How to prove yourself: Practical solutions of Identification
and signature Problems, Advances in Cryptology - CRYPTO 86, Santa Barbara (Ca.), August 1986

Das könnte Ihnen auch gefallen