Design of an intrusion-tolerant system considering quality of service and diversity서비스 품질과 다양성을 고려한 침입감내 시스템 설계

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 503
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorYoon, Hyunsoo-
dc.contributor.advisor윤현수-
dc.contributor.authorHeo, Seondong-
dc.contributor.author허선동-
dc.date.accessioned2018-05-23T19:38:26Z-
dc.date.available2018-05-23T19:38:26Z-
dc.date.issued2017-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=675859&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/242083-
dc.description학위논문(박사) - 한국과학기술원 : 전산학부, 2017.2,[iv, 49 :]-
dc.description.abstractImprovements in networking technologies have provided users with useful information services. Such information services may bring convenience and efficiency, but might be accompanied by vulnerabilities to a variety of attacks. Therefore, a variety of research to enhance the security of the systems and get the services at the same time has been carried out. Especially, research on intrusion-tolerant systems (ITSs) has been conducted in order to survive against every intrusion, rather than to detect and prevent them. In this paper, we present two schemes to provide the appropriate level of service and security service. The first scheme is effective resource conversion (ERC), which transforms the assigned resources depending on the system status. The ITS based on ERC changes the number of virtual machines (VMs) to process requests and recover, instead of using the fixed number of VMs as in conventional approaches. The second scheme finds software combinations that minimize the risk of common vulnerabilities. The ITS based on ERC employs redundant components to eliminate the SPOF problem and improve system reliability. However, systems that include identical components have common vulnerabilities that can be exploited to attack the servers. We analyze software vulnerability data from the National Vulnerability Database (NVD). Based on the analysis results, we present a scheme that finds software combinations that improve intrusion tolerance of the system. We implement these schemes with CSIM20, and simulation results prove that proposed schemes are appropriate for a recovery-based intrusion tolerant architecture.-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectIntrusion-Tolerant System-
dc.subjectVirtual Machine-
dc.subjectExposure Time-
dc.subjectDiversity-
dc.subjectVulnerability-
dc.subject침입감내 시스템-
dc.subject가상 머신-
dc.subject노출 시간-
dc.subject다양성-
dc.subject취약점-
dc.titleDesign of an intrusion-tolerant system considering quality of service and diversity-
dc.title.alternative서비스 품질과 다양성을 고려한 침입감내 시스템 설계-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :전산학부,-
Appears in Collection
CS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0