CuPIDS: An exploration of highly focused, co-processor-based information system protection

被引:4
作者
Williams, Paul D. [1 ]
Spafford, Eugene H.
机构
[1] USAF, Inst Technol, Dept Elect & Comp Engn, Wright Patterson AFB, OH 45433 USA
[2] Purdue Univ, CERIAS, W Lafayette, IN 47907 USA
关键词
intrusion detection; information system security; co-processor; multi-processor; security policy compliance monitoring;
D O I
10.1016/j.comnet.2006.09.011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Co-Processing Intrusion Detection System (CuPIDS) project explores improving information system security through dedicating computational resources to system security tasks in a shared resource, multi-processor (MP) architecture. Our research explores ways in which this architecture offers improvements over the traditional uni-processor (UP) model of security. One approach we examined has a protected application running on one processor in a symmetric multi-processing (SMP) system while a shadow process specific to that application runs on a different processor. The shadow process monitors the application process' activity, ready to respond immediately if the application violates policy. Experiments with a prototype CuPIDS system demonstrate the feasibility of this approach in the context of a self-protecting and self-healing system. An untuned prototype supporting fine-grained protection of the real-world application WU-FTP resulted in less than a 15% slowdown while demonstrating CuPIDS' ability to quickly detect illegitimate behavior, raise an alarm, automatically repair the damage done by the fault or attack, allow the application to resume execution, and export a signature for the activity leading up to the error. (c) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:1284 / 1298
页数:15
相关论文
共 33 条
[1]  
ANDERSON JP, 1972, ESDTR7351, V2
[2]  
[Anonymous], 2003, P NETW DISTR SYST SE
[3]  
[Anonymous], 2001, APPL OPERATING SYSTE
[4]   A secure and reliable bootstrap architecture [J].
Arbaugh, WA ;
Farber, DJ ;
Smith, JM .
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, :65-71
[5]  
Axelsson S., 2000, 9915 CHALM U
[6]  
Bell D.Elliott., 1973, Secure computer systems mathematical foundations
[7]  
Biba K.J., 1977, TR3153
[8]  
CROSBIE M, 1996, 9604 COAST TR, P96050
[9]  
FENG H, 2004, IEEE S SEC PRIV
[10]   Anomaly detection using call stack information [J].
Feng, HHP ;
Kolesnikov, OM ;
Fogla, P ;
Lee, WK ;
Gong, WB .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :62-75