Investigation of intrusion tolerance for COTS middleware

被引:0
|
作者
Rathi, M [1 ]
Anjum, F [1 ]
Zbib, R [1 ]
Ghosh, A [1 ]
Umar, A [1 ]
机构
[1] Appl Res, Telcordia Technol, Morristown, NJ 07960 USA
关键词
COTS middleware; intrusion tolerance; security; fragmentation-redundancy-scattering;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reliance of critical and other commonly used information systems on COTS middleware (CORBA, MOM, Web servers, etc.) has continued to grow tremendously in the past few years. However, COTS middleware is generally too weak to handle intrusions (i.e., information attacks), thus making critical and commonly used information systems highly vulnerable. In this paper, we evaluate the possible intrusion scenarios associated with today's commercial middleware platforms and discuss the possible impacts. We also briefly describe our approach based on the concepts of Fragmentation-Redundancy-Scattering (FRS) to provide intrusion tolerance to some of these intrusion threats and the utilities provided by the middleware to implement needed functionality. Finally, we set the stage for our current and future work for applying broad variety of FRS algorithms to a broad spectrum of COTS Middleware.
引用
收藏
页码:1169 / 1173
页数:5
相关论文
共 50 条
  • [1] Intrusion tolerance in distributed middleware
    Zbib, R
    Anjum, F
    Ghosh, A
    Umar, A
    [J]. INFORMATION SYSTEMS FRONTIERS, 2004, 6 (01) : 67 - 75
  • [2] Intrusion Tolerance in Distributed Middleware
    Rabih Zbib
    Farooq Anjum
    Abhrajit Ghosh
    Amjad Umar
    [J]. Information Systems Frontiers, 2004, 6 : 67 - 75
  • [3] The Starfish system: Providing intrusion detection and intrusion tolerance for middleware systems
    Kihlstrom, KP
    Narasimhan, P
    [J]. EIGHTH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, PROCEEDINGS, 2003, : 191 - 199
  • [4] SITIS: Scalable intrusion tolerance middleware for Internet service survivability
    Lee, G
    Im, C
    Lee, T
    Kim, H
    Lee, DH
    [J]. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2004, PT 1, PROCEEDINGS, 2004, 3331 : 564 - 571
  • [5] A Real-Time Intrusion-Tolerance Middleware Framework
    Lei Fuxing
    Guo Yuanbo
    Zhang Laishun
    Zhou Ruipeng
    [J]. ISTM/2009: 8TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, 2009, : 1421 - 1424
  • [6] Revisiting COTS middleware for DRE systems
    Hugues, M
    Pautet, L
    Kordon, F
    [J]. ISORC 2005: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2005, : 72 - 79
  • [7] Rigorous evaluation of COTS Middleware technology
    Gorton, I
    Liu, A
    Brebner, P
    [J]. COMPUTER, 2003, 36 (03) : 50 - +
  • [8] Intrusion tolerant middleware
    Umar, A
    Anjum, F
    Ghosh, A
    Zbib, R
    [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 242 - 256
  • [9] Empirical differences between COTS middleware scheduling strategies
    Gill, CD
    Kuhns, F
    Schmidt, DC
    Cytron, RK
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2002: COOPLS, DOA, AND ODBASE, 2002, 2519 : 922 - 947
  • [10] Accelerating COTS middleware acquisition: The i-Mate process
    Liu, A
    Gorton, I
    [J]. IEEE SOFTWARE, 2003, 20 (02) : 72 - +