Skip to main content

Using Diversity in Cloud-Based Deployment Environment to Avoid Intrusions

  • Conference paper
Book cover Software Engineering for Resilient Systems (SERENE 2011)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 6968))

Included in the following conference series:

Abstract

This paper puts forward a generic intrusion-avoidance architecture to be used for deploying web services on the cloud. The architecture, targeting the IaaS cloud providers, avoids intrusions by employing software diversity at various system levels and dynamically reconfiguring the cloud deployment environment. The paper studies intrusions caused by vulnerabilities of system software and discusses an approach allowing the system architects to decrease the risk of intrusions. This solution will also reduce the so-called system’s days-of-risk which is calculated as a time period of an increased security risk between the time when a vulnerability is publicly disclosed to the time when a patch is available to fix it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004)

    Article  Google Scholar 

  2. Cachin, C., Poritz, J.: Secure Intrusion Tolerant Replication on the Internet. In: Proc. International Conference on Dependable Systems and Networks, pp. 167–176 (2002)

    Google Scholar 

  3. Veríssimo, P., Neves, N.F., Correia, M.: The Middleware Architecture of MAFTIA: A Blueprint. In: Proc. 3rd IEEE Survivability Workshop (2000)

    Google Scholar 

  4. Pal, P., Rubel, P., Atighetchi, M., et al.: An Architecture for Adaptive Intrusion-Tolerant Applications. Special Issue of Software: Practice and Experience on Experiences with Auto-adaptive and Reconfigurable Systems 36(11-12), 1331–1354 (2006)

    Google Scholar 

  5. Nguyen, Q.L., Sood, A.: Realizing S-Reliability for Services via Recovery-driven Intrusion Tolerance Mechanism. In: Proc. 4th Workshop on Recent Advances in Intrusion-Tolerant Systems (2010)

    Google Scholar 

  6. Chatzis, N., Popescu-Zeletin, R.: Special Issue on Detection and Prevention of Attacks and Malware. Journal of Information Assurance and Security 4(3), 292–300 (2009)

    Google Scholar 

  7. Raggad, B.: A Risk-Driven Intrusion Detection and Response System. International Journal of Computer Science and Network Security 12 (2005)

    Google Scholar 

  8. Valdes, A., Almgren, M., Cheung, S., Deswarte, Y., Dutertre, B., Levy, J., Saïdi, H., Stavridou, V., Uribe, T.E.: An Architecture for an Adaptive Intrusion-Tolerant Server. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol. 2845, pp. 158–178. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Powell, D., Adelsbach, A., Randell, B., et al.: MAFTIA (Malicious- and Accidental-Fault Tolerance for Internet Applications). In: Proc. International Conference on Dependable Systems and Networks, vol. 35, pp. 32–35 (2001)

    Google Scholar 

  10. Ford, R., Thompson, H.H., Casteran, F.: Role Comparison Report – Web Server Role. Security Innovation Inc., p. 37 (2005), http://www.microsoft.com/windowsserver/compare/ReportsDetails.mspx?recid=31

  11. Buyya, R., Broberg, J., Goscinskin, A.M. (eds.): Cloud Computing Principles and Paradigms, p. 664. Wiley, Chichester (2011)

    Google Scholar 

  12. Strigini, L., Avizienis, A.: Software Fault-Tolerance and Design Diversity: Past Experience and Future Evolution. In: Proc. 4th Int. Conf. on Computer Safety, Reliability and Security, pp. 167–172 (1985)

    Google Scholar 

  13. Jones, J.: Days-of-risk in 2006: Linux, Mac OS X, Solaris and Windows (2006), http://blogs.csoonline.com/days_of_risk_in_2006

  14. Garcia, M., Bessani, A., Gashi, I., Neves, N., Obelheiro, R.: OS Diversity for Intrusion Tolerance: Myth or Reality? In: Proc. Performance and Dependability Symposium at the International Conference on Dependable Systems and Networks, pp. 383–394 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gorbenko, A., Kharchenko, V., Tarasyuk, O., Romanovsky, A. (2011). Using Diversity in Cloud-Based Deployment Environment to Avoid Intrusions. In: Troubitsyna, E.A. (eds) Software Engineering for Resilient Systems. SERENE 2011. Lecture Notes in Computer Science, vol 6968. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24124-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24124-6_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24123-9

  • Online ISBN: 978-3-642-24124-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics