Homogeneity as an advantage: it takes a community to protect an application

作者: Patrick Lincoln , Peter Kwan , Adam J. Oliner , John C. Mitchell , Steven Dawson

DOI:

关键词:

摘要: We examine how to turn the scale of a large homogeneous software deployment from an operational and security disadvantage into advantageous application community that can detect, diagnose, recover its own faults malicious attacks. propose system called VERNIER provides virtualized execution environment in conjunction with collaborative diagnosis response functions using knowledge-sharing infrastructure. report on preliminary implementation system, experimental evaluation, lessons learned during development.

参考文章(19)
Vinod Yegneswaran, Guofei Gu, Wenke Lee, Martin Fong, Phillip Porras, BotHunter: detecting malware infection through IDS-driven dialog correlation usenix security symposium. pp. 12- ,(2007)
Karin Sallhammar, None, Stochastic Models for Combined Security and Dependability Evaluation Fakultet for informasjonsteknologi, matematikk og elektroteknikk. ,(2007)
Julian Bennett Grizzard, Henry L. Owen, Towards self-healing systems: re-establishing trust in compromised systems Georgia Institute of Technology. ,(2006)
Greg Hoglund, Jamie Butler, Rootkits: Subverting the Windows Kernel ,(2005)
Cory Lueninghoener, Rick Bradshaw, Narayan Desai, Directing change using Bcfg2 usenix large installation systems administration conference. pp. 17- 17 ,(2006)
Galen Hunt, Doug Brubacher, Detours: binary interception of Win32 functions conference on usenix windows nt symposium. pp. 14- 14 ,(1999)
John C. Platt, Helen J. Wang, Yi-Min Wang, Ruyun Zhang, Yu Chen, Automatic misconfiguration troubleshooting with peerpressure operating systems design and implementation. pp. 17- 17 ,(2004)
Michael E. Locasto, Angelos D. Keromytis, Stelios Sidiroglou, Software Self-Healing Using Collaborative Application Communities network and distributed system security symposium. pp. 95- 106 ,(2006) , 10.7916/D8RR27M5
Elizabeth Stinson, John C. Mitchell, Characterizing Bots’ Remote Control Behavior Detection of Intrusions and Malware, and Vulnerability Assessment. pp. 89- 108 ,(2007) , 10.1007/978-3-540-73614-1_6
Paul Dourish, Daniel C. Swinehart, Marvin Theimer, The Doctor Is In: Helping End Users Understand the Health of Distributed Systems distributed systems operations and management. pp. 157- 168 ,(2000) , 10.1007/3-540-44460-2_14