Analysis of operating system diversity for intrusion tolerance

被引:79
作者
Garcia, Miguel [1 ]
Bessani, Alysson [1 ]
Gashi, Ilir [2 ]
Neves, Nuno [1 ]
Obelheiro, Rafael [3 ]
机构
[1] Univ Lisbon, Fac Sci, P-1749016 Lisbon, Portugal
[2] City Univ London, London EC1V 0HB, England
[3] State Santa Catarina Univ, Florianopolis, SC, Brazil
关键词
replication; diversity; operating systems; vulnerabilities; intrusion tolerance; FAULT-TOLERANCE; DESIGN;
D O I
10.1002/spe.2180
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity. To what extent failure diversity is observed in practical deployment depends on how diverse are the components that constitute the system. In this paper, we present a study with operating system's (OS's) vulnerability data from the NIST National Vulnerability Database (NVD). We have analyzed the vulnerabilities of 11 different OSs over a period of 18 years, to check how many of these vulnerabilities occur in more than one OS. We found this number to be low for several combinations of OSs. Hence, although there are a few caveats on the use of NVD data to support definitive conclusions, our analysis shows that by selecting appropriate OSs, one can preclude (or reduce substantially) common vulnerabilities from occurring in the replicas of the intrusion-tolerant system. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:735 / 770
页数:36
相关论文
共 58 条
  • [1] Abd-El-Malek Michael, 2005, Operating Systems Review (OSR), V39, P59, DOI [10.1145/1095810.1095817, DOI 10.1145/1095810.1095817]
  • [2] Quantitative vulnerability assessment of systems software
    Alhazmi, OH
    Malaiya, YK
    [J]. ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2005 PROCEEDINGS, 2005, : 615 - 620
  • [3] Application of vulnerability discovery models to major operating systems
    Alhazmi, Omar H.
    Malaiya, Yashwant K.
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2008, 57 (01) : 14 - 22
  • [4] Anbalagan P, 2009, P INT S SOFTW REL EN, P136, DOI [10.1109/ISSRE.2009.25, DOI 10.1109/ISSRE.2009.25]
  • [5] Anderson R. J., 2002, C OP SOURC SOFTW EC
  • [6] [Anonymous], 2011, SYM INT SEC THREAT R
  • [7] Avizienis A, 1977, P S HIGH SPEED ALG O, P173
  • [8] Bessani AN, 2008, EUROSYS'08: PROCEEDINGS OF THE EUROSYS 2008 CONFERENCE, P163, DOI 10.1145/1357010.1352610
  • [9] BASE: Using abstraction to improve fault tolerance
    Castro, M
    Rodrigues, R
    Liskov, B
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2003, 21 (03): : 236 - 269
  • [10] Practical byzantine fault tolerance and proactive recovery
    Castro, M
    Liskov, B
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04): : 398 - 461