![]() |
![]() Malicious-and Accidental-Fault Tolerance for Internet Applications IST Research Project IST- 1 January 2000 - 28 February 2003 |
|
|
|
|||||||||||||||||||||||
[ Conceptual Model ] [ Architecture ] [ Mechanisms and Protocols ] [ Verification and Assessment ] Conceptual ModelMAFTIA uses fault tolerance techniques to build dependable systems that are intrusion tolerant, that is, able to continue providing a secure service, despite the presence of malicious faults, i.e. deliberate attacks on the security of the system. Such faults are perpetrated by attackers who make unauthorised attempts to access, modify, or destroy information in a system, and/or to render the system unreliable or unusable. Attacks are facilitated by vulnerabilities, which are faults created during the development of the system or during its operation. A successful attacker is said to be an intruder, and a successful attack results in an intrusion upon the system. Thus, MAFTIA distinguishes between attacks, vulnerabilities, and intrusions as three types of interrelated faults:
|
|||||||||||||||||||||||||
Figure 1 - Intrusion as a composite fault Attacks may be viewed either at the level of the human activity of the attacker, or at the level of the resulting technical activity observable within the considered computer system:
The development of a dependable computing system calls for the combined utilization of a set of four techniques:
Equating attack (in both the human and technical senses), vulnerability and intrusion with fault, we can obtain a priori sixteen methods for ensuring or assessing security, of which ten are distinguishable (Table 1): Table 1 Classification of security methods
The main focus of MAFTIA was on intrusion tolerance and vulnerability removal. An intrusion tolerant system must continue to deliver correct service despite the presence of active faults, both malicious and accidental. By exploring the relationship between intrusion detection and intrusion tolerance, MAFTIA has shown how ideas derived from the dependability community and the intrusion-detection community might fit together in a single integrated framework. Figure 2 Integrated intrusion-tolerance framework From the viewpoint of intrusion-detection, the Intrusion Detection System (IDS) within this integrated framework consists of the set of external and internal sensors, the error-detection mechanisms of any intrusion-tolerant components, and the event analysis and fault diagnosis mechanisms that signal intruder reports to a system security officer. These are shown in dark grey in the diagram. [ Conceptual Model ] [ Architecture ] [ Mechanisms and Protocols ] [ Verification and Assessment ] |
|