A Vulnerability Analysis of Intrusion Tolerance System using Self-healing Mechanism

자가치유 메커니즘을 활용한 침입감내시스템의 취약성 분석

  • 박범주 (삼성전자 첨단기술연구소) ;
  • 박기진 (아주대학교 산업정보시스템공학부) ;
  • 김성수 (아주대학교 정보통신전문대학원)
  • Published : 2005.08.01

Abstract

One of the most important core technologies required for the design of the ITS (Intrusion Tolerance System) that performs continuously minimal essential services even when the network-based computer system is partially compromised because of the external or internal intrusions is the quantitative dependability analysis of the ITS. In this paper, we applied self-healing mechanism, the core technology of autonomic computing to secure the protection power of the ITS. We analyzed a state transition diagram of the ITS composed of a Primary server and a backup server utilizing two factors of self-healing mechanism (fault model and system response) and calculated the availability of ITS through simulation experiments and also performed studies on two cases of vulnerability attack.

네트워크 기반 컴퓨터 시스템이 외부 침입이나 혹은 내부 침입에 의해 부분적으로 손상 (Partially Compromised)이 되더라도 최소한의 필수 서비스를 지속적으로 제공할 수 있게 해주는 침입감내시스템(Intrusion Tolerance System) 설계에 요구되는 중요한 요소 기술 중의 하나는 컴퓨터 시스템의 정량적 신인도(Dependability) 분석이라 할 수 있다. 본 논문에서는 침입감내시스템의 방어능력을 확보하기 위해 자율컴퓨팅(Autonomic Computing)의 핵심 기술인 자가 치유(Self-healing) 메커니즘을 적용하였다. 주 서버와 보조서버로 구성된 침입감내시스템의 상태천이(State Transition)를 자가치유 메커니즘의 두 가지 요소(결함모델 및 시스템반응)를 활용하여 분석하였으며, 시뮬레이션 실험을 통해 침입감내시스템의 가용도(Availability)를 계산한 후, 두 가지 경우의 취약성(Vulnerability) 공격에 대한 사례 연구를 진행하였다.

Keywords

References

  1. F. Wang, R. Uppalli, and C. Killian, 'Analysis of Techniques for Building Intrusion Tolerant Server Systems,' Proceedings of Military Communications Conference, pp.729-734, Oct., 2003 https://doi.org/10.1109/MILCOM.2003.1290202
  2. A. Avizienis, J. Laprie, B. Randell, 'Fundamental concepts of dependability,' 3rd Information Survivability Workshop, pp. 7-12. Oct. 2000
  3. P. Koopman, 'Elements of the Self-Healing System Problem Space,' Workshop on Architecting Dependable Systems, pp. 31-36, May 2003
  4. D. Chess, C. Palmer, and S. White, 'Security in an Autonomic Computing Environment,' IBM Systems Journal, Vol. 42, No.1, pp. 107-118, 2003 https://doi.org/10.1147/sj.421.0107
  5. http://www.laas.research.ec.org/maftia/
  6. J. Reynolds, et al., 'On-line Intrusion Detection Attack Prevention Using Diversity Generate-and-Test, and Generalization,' Proceedings of the 36th Annual Hawaii International Conferences on System Sciences, pp.335-342, Jan., 2003 https://doi.org/10.1109/HICSS.2003.1174911
  7. F. Wang, et. al., 'SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services,' Proceedings of the Foundations of Intrusion Tolerant Systems, pp. 359-367, 2003 https://doi.org/10.1109/FITS.2003.1264942
  8. F. Wang and C. Killian, 'Design and Implementation of SITAR Architecture : A Status Report,' Proceedings of Intrusion Tolerant System Workshop, C-3-1, Supplemental Volume on International Conference on Dependable System & Networks, June 2002
  9. T. Courtney, et. al., 'Providing Intrusion Tolerance with ITUA.' Proceedings of the International Conference on Dependable Systems & Networks, pp. C-5-1 - C-5-3, June 2002
  10. P. Luenam and P. Liu, 'The Design of an Adaptive Intrusion Tolerant Database System,' Proceedings of IEEE Workshop on Intrusion Tolerant Systems, pp. C-2-1 - C-2-8, June 2002 https://doi.org/10.1109/FITS.2003.1264925
  11. J. Knight, et. al., 'The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications,' Technical Report CU-CS926-01, Department of Computer Science, University of Colorado, December, 2001
  12. K. Goseva-Popstojanova, et. al., 'Characterizing Intrusion Tolerant Systems using a State Transition Model,' DARFA Information Survivability Conference and exhibition, Vol. 2, pp. 211-221, June 2001 https://doi.org/10.1109/DISCEX.2001.932173
  13. D. Wang, B. Madan, and K. Trivedi, 'Security Analysis of SIT AH Intrusion Tolerance System,' Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems, pp, 23- 32, Oct. 2003
  14. G. Kim, M. Choi, and K. Lee, 'Classification of the Intrusion Tolerant Systems and Integrated Framework for Survivability Enhancement,' The Korea Information Processing Society Transactions, Vol. 10C, No.3, pp.295-304, 2003 https://doi.org/10.3745/KIPSTC.2003.10C.3.295
  15. C. Shelton, P. Koopman, and W. Nace, 'A Framework for Scalable Analysis and Design of System-Wide Graceful degradation in distributed Embedded Systems.' Eighth IEEE International Workshop on Object-oriented Real-time Dependable Systems, pp.156-163, Jan. 2003
  16. O. Raz, P. Koopman, and M. Shaw, 'Enabling Automatic Adaptation in Systems with Under-Specified Elements,' 1st Workshop on Self-Healing Systems, pp. 55-60, Nov. 2002
  17. J. Kephart, and D. Chess, 'The Vision of Autonomic Computing,' IEEE Computer, Vol. 36, No. 2. pp, 41-50. 2003 https://doi.org/10.1109/MC.2003.1160055
  18. L. Kleinrock, Queueing Systems: Volume 1 Theory, John Wiley & Sons, pp. 417, 1975
  19. K. Trivedi, Probability and Statistics with Reliability Queueing and Computer Science Applications, John Wiley & Sons, Inc., pp. 472, 2002
  20. B. Madan, et al., 'Modeling and Quantification of Security Attributes of Software Systems,' Proceedings of the International Conference on Dependable Systems and Networks, pp.505-514, June, 2002 https://doi.org/10.1109/DSN.2002.1028941