DOI QR코드

DOI QR Code

Classification of the Intrusion Tolerant Systems and Integrated Framework for Survivability Enhancement

생존성 강화를 위한 침입감내 시스템의 분류와 통합 프레임워크 제안

  • 김기한 (ETRI 부설 국가보안기술연구소) ;
  • 최명렬 (ETRI 부설 국가보안기술연구소) ;
  • 이경환 (중앙대학교 컴퓨터공학과)
  • Published : 2003.06.01

Abstract

Currently security researchers focus on protection of program and data from malicious users and accidents. Therefore, many firewalls and intrusion detection systems have been developed commercially. The intrusion tolerance is a new concept that is the last line of defense for the information survivability. It emphasizes availability and integrity to provide critical system services continuously even when system is compromised. In this paper, we classify current intrusion tolerant technologies from the point of view of program and data. Furthermore, we propose an integrated framework that supports intrusion tolerance of program and data.

기존의 보안관점은 악의적인 사용자의 공격이나 우발적인 사고로부터 프로그램과 데이터의 보호를 강조한다. 이를 위한 방화벽, 침입탐지시스템의 연구개발은 성숙 단계에 접어들었다. 최근들어 새롭게 대두되고 있는 침입감내 개념은 정보 생존성을 위한 마지막 방어선으로 공격이 성공하더라도 임무 수행에 필수적인 시스템의 중요 서비스를 계속 제공하기 위해 가용성과 무결성을 강조하는 개념이다. 본 논문에서는 침입감내 시스템을 프로그램 보호와 데이터 보호관점에서 분류하고 프로그램과 데이터의 침입감내 특성을 모두 지원하는 통합된 침입감내 프레임워크를 제안한다.

Keywords

References

  1. DARPA OASIS project home page, http://www.darpa.mil/ipto/research/oasis/
  2. 박상서, 정보전 대응체계 구축 현황, WISC2000 튜토리얼 자료집, 2000
  3. http://www.afrlsn.afrl.af.mil/LA&S_topics.htmll#ITS
  4. http://www.darpa.mil/ipto/research/oasis/demval-goals.html
  5. Gergory R. Ganger et. al., Survivable Storge Systems, Procceedings of DISCEX2001, 2001
  6. Katerina Goseva-Popstojanova et. al., Characterizing Intrusion Tolerant Systems Using a State Transition Model, Proceedings of DISCEX2001, 2001 https://doi.org/10.1109/DISCEX.2001.932173
  7. 유찬수, 리눅스 클러스터링, 정보과학회지, 제18권 제2호, 2000
  8. Gary McGraw et. al., Securing Java, Wiley, pp.38-48, 1999
  9. Marcelo Tallis, et.al., 'Document Integrity through Mediated Interfaces,' Proceedings of DISCEX2001, 2001
  10. Peng Liu, et. al., Intrusion Tolerant Database Systems, Technical Report, Dept.of Info.Systems, Univ.of Maryland, Baltimore County, 2001
  11. Partha P. Pal, et. al., Defense-Enabling Using Advanced Middleware: An Example, Proceedings of MILCOM2001, 2001 https://doi.org/10.1109/MILCOM.2001.985770
  12. Amjad Umar, et. al., Intrusion Tolerant Middleware, Proceedings of DISCEX2001, 2001 https://doi.org/10.1109/DISCEX.2001.932176
  13. Patrick McDaniel, et. al., Antigone : A Flexible Framework for Secure Group Communication, Proceedings of the 8th USENLX Security Symposium, pp.99-114, 1999
  14. Gene H. Kim, et. al., The Design and Implementation of Tripwire : A File System Integrity Checker, Proceedings of the 2nd ACM Conference on CCS'94, pp.18-29, 1994 https://doi.org/10.1145/191177.191183
  15. Matthew Schimid, et. al., Preventing the Execution of Unauthorized Win32 Applications, Proceedings of DISCEK2001, 2001 https://doi.org/10.1109/DISCEX.2001.932170
  16. Terrance Mitchem, et. al., Linux Kernel Loadable Wrapper, Proceedings DISCEX2000, 2000 https://doi.org/10.1109/DISCEX.2000.821528
  17. Tim Hollebeek, et. al., Interception, Wrapping and Analysis Framework for Win32 Scripts, Proceedings of DISCEX2000, 2000 https://doi.org/10.1109/DISCEX.2001.932174
  18. Kenneth P. Birman, et. al., Spinglass : Secure and Scalable Communication Tools for Mission-Critical Computing, Proceedings of DISCEX2001, 2001 https://doi.org/10.1109/DISCEX.2001.932161
  19. Galen Hung, et. al., Detours : Binary Interception of Win32 Functions, Proceedings of the 3rd USENIX Windows NT Symposium, 1999
  20. Shaun Clowes, BlackHat Briefings 2001 in Amsterdam, Holland, http://www.securereality.com.au/archives.html
  21. Victoria Stavridou, et.al., Intrusion Tolerant Software Architectues, Proceedings of DISCEX2001, 2001
  22. Feiyi Wang, et. al., SITAR : A Scalable Intrusion-Tolerant Architecture for Distrubuted Services, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, 2001 https://doi.org/10.1109/DISCEX.2003.1194957