期刊文献+

软件相异性对于系统安全的有效性分析 被引量:7

ANALYZING THE EFFECTIVENESS OF SOFTWARE DIVERSITY FOR SYSTEM SECURITY
下载PDF
导出
摘要 主流入侵检测系统的主要工作原理,是比较两个功能相似的软件在处理同样的输入时所得到的结果的异同来判断其中一个软件是否被恶意软件所入侵。在构造此类入侵检测系统时,一般假定所选定的软件拥有足够相异性,以至于他们不会同时被同一个恶意软件所攻破。通过针对2007年全年6000多个软件漏洞进行系统性分析来衡量这个假设的合理性。分析的结果表明98%以上的功能相同的应用软件都可以用来有效地构造此类入侵检测系统,将近半数的应用软件可以通过同时运行在多个操作系统平台上来有效地提高系统的安全性。 Principal working theory of mainstream intrusion detection system is that to compare the outcomes of two softwares with similar functions when tackling the same input and to determine one of them has or has not been intruded by malicious software based on the differ- ences of their outcomes. When these replicas are constructed using off-the-shelf software products, it is assumed that they are sufficiently di- verse and will not be compromised simultaneously under the attack from same malicious software. In this paper,we analyzed 6000 or more vul- nerabilities published in 2007 to evaluate the validity of this assumption. Analytical results demonstrate that about 98% or more application software with same functions can be used to form the intrusion detection system of such kind effectively, and almost half of these applications can be run on multiple operating system platform simultaneously for improving system security effectually.
作者 韩进 臧斌宇
出处 《计算机应用与软件》 CSCD 2010年第9期273-275,300,共4页 Computer Applications and Software
关键词 软件相异性 软件漏洞 行为距离 Software diversity Software vulnerability Behavioural distance
  • 相关文献

参考文献11

  • 1Elena Gabriela Barrantes,David H Ackley,Trek S Palmer,et al.Randomized instruction set emulation to disrupt binary code injection attacks[C] //CCS'03:Proceedings of the 10th ACM conference on Computer and communications security,New York,NY,USA,2003:281-289.
  • 2Sandeep Bhatkar,Daniel C DuVarney,Sekar r.Address obfuscation:an efficient approach to combat a board range of memory error exploits[C] //Proceedings of the 12th conference on USENIX Security Symposium,Berkeley,CA,USA,2003:8.
  • 3Cox B,Evans D,Filipi A,et al.N-variant systems-A secretless framework for security through diversity[C] //Proceedings of the 15th USENIX Security Symposium,August 2006.
  • 4Debin Gao,Michael K Reiter,Dawn Song.Behavioral distance for intrusion detection[C] //Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID 2005),2005:63-81.
  • 5Debin Gao,Michael K Reiter,Dawn Song.Behavioral distance measurement using hidden markov models[C] //Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006),2006:19-40.
  • 6Geer D,Bace R,Gutmann P,et al.The cost of monopoly.Technical report,CCIA,2003.
  • 7Gaurav S Kc,Angelos D Keromytis,Vassilis Prevelakis.Countering code-injection attacks with instruction-set randomization[C] //Proceedings of the 10th ACM conference on Computer and communications security,New York,NY,USA,ACM,2003:272-280.
  • 8Richard C Linger.Systematic generation of stochastic diversity as an intrusion barrier in survivable systems software[C] //HICSS'99:Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciences-Volume 3,Washington,DC,USA,IEEE Computer Society,1999:3062.
  • 9Adam J.O'Donnell,Harish Sethu.On achieving software diversity for improved network security using distributed coloring algorithms[C] //CCS'04:Proceedings of the 11th ACM conference on Computer and communications security,New York,NY,USA,ACM,2004:121-131.
  • 10Salton G,Wong A,Yang C S.A vector space model for automatic indexing[J].Communications of the ACM,1975,18(11):613-620.

同被引文献52

引证文献7

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部