Beruflich Dokumente
Kultur Dokumente
INTRUSION TARGETS:
INFORMATION CONFIDENTIALITY INFORMATION INTEGRITY SERVICE AVAILABILITY
Intrusion- tolerant distributes system is a system in which intrusion into a part will not endanger confidentiality , integrity and availability Instead of trying to prevent every single intrusion, the intrusions are allowed but tolerated
System has the means to trigger mechanisms that prevent intrusion from generating a system failure
Vulnerability+ Attacks Successful Attacks Faults Errors
Error Processing
No System Failure
Intrusion into the distributed server sites should not endanger confidentiality and integrity of sensitive data and should not produce any denial of service
To be successful, an attacker would have to intrude into a majority of the server sites or bribe a majority of the site administrators
FRS technique F Fragmentation(cutting all sensitive information into fragments) R Redundancy(Replication) S Scattering(distributing the fragments among different sites) Resource consuming for enemy Helps in intrusion detection Eg : Consider a user whose file is to be made intrusion tolerant
Vulnerability
Attack
Intrusion
Error
Failure
Vulnerability removal
Diagnosis
Isolation
Reconfiguration
Security, being an issue that cannot be taken lightly, any circumstance where in an immediate action has to be taken place to keep up the security, tolerance approach is the one effective. Intrusion tolerance is one of the effective approaches to handle the intrusions. Using the Intrusion tolerant measures and protocols, though intrusion takes place it can certainly be tolerated.
[1] Blain L. and Deswarte Y., An intrusion-tolerant security server for an open
[5] Fiat A. and Shamir A., How to prove yourself: Practical solutions of Identification
and signature Problems, Advances in Cryptology - CRYPTO 86, Santa Barbara (Ca.), August 1986