Diversity-Based Approaches to Software Systems Security

被引:0
作者
Gherbi, Abdelouahed [1 ]
Charpentier, Robert [2 ]
机构
[1] ETS, Dept Software & IT Engn, Montreal, PQ, Canada
[2] Def Res & Dev Canada, Valcartier, Quebec City, PQ, Canada
来源
SECURITY TECHNOLOGY | 2011年 / 259卷
关键词
Security; IT monoculture; Diversity; Dynamic monitoring; BEHAVIORAL DISTANCE; INTRUSION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software systems security represents a major concern as cyber-attacks continue to grow in number and sophistication. In addition to the increasing complexity and interconnection of modern information systems, these systems run significant similar software. This is known as IT monoculture. As a consequence, software systems share common vulnerabilities, which enable the spread of malware. The principle of diversity can help in mitigating the negative effects of IT monoculture on security. One important category of the diversity-based software approaches for security purposes focuses on enabling efficient and effective dynamic monitoring of software system behavior in operation. In this paper, we present briefly these approaches and we propose a new approach which aims at generating dynamically a diverse set of lightweight traces. We initiate the discussion of some research issues which will be the focus of our future research work.
引用
收藏
页码:228 / +
页数:4
相关论文
共 30 条
[1]   Networking aspects in the DPASA survivability architecture: An experience report [J].
Atighetchi, M ;
Rubel, P ;
Pal, P ;
Chong, J ;
Sudin, L .
Fourth IEEE International Symposium on Network Computing and Applications, Proceedings, 2005, :219-222
[2]   Basic concepts and taxonomy of dependable and secure computing [J].
Avizienis, A ;
Laprie, JC ;
Randell, B ;
Landwehr, C .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) :11-33
[3]  
Bain C., 2001, IFIP C P, V211, P77
[4]  
Barrantes E.G., 2003, P 10 ACM C COMPUTER, P281, DOI DOI 10.1145/948109.948147
[5]  
Bessani Alysson Neves, 2008, ACM IFIP USENIX 9 IN, P99
[6]  
Bhatkar S, 2008, LECT NOTES COMPUT SC, V5137, P1, DOI [10.1007/978-3-540-70542-0_1, 10.1145/1556444.1556449]
[7]  
Chong J, 2005, 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, P449
[8]  
Cox B., 2006, USENIX SS 2006
[9]  
Deswarte Y, 2004, INT FED INFO PROC, V156, P241
[10]  
Deswarte Y., 1998, Proceedings of Computer Security, Dependability and Assurance: From Needs to Solutions, P171