Panel on Intrusion Tolerance
RAID 2001 UC Davis October 11, 2001
Panel on Intrusion Tolerance RAID 2001 UC Davis October 11, - - PowerPoint PPT Presentation
Panel on Intrusion Tolerance RAID 2001 UC Davis October 11, 2001 Participants Crispin Cowan, WireX Communications Andreas Wespi, IBM Zurich Research Lab. Al Valdes, SRI International Dan Schnackenberg, Boeing Phantom Works
RAID 2001 UC Davis October 11, 2001
Yves Deswarte LAAS-CNRS Toulouse, France deswarte@laas.fr David Powell
J.-C. Laprie (Ed.), Dependability: Basic Concepts and Terminology in English, French, German, Italian and Japanese, 265p., ISBN 3-211-82296-8, Springer-Verlag, 1992.
Error Error
adjudged or hypothesized cause of an error that part of system state which may lead to a failure
Fault
implementing the system function
H/W fault Bug Attack Intrusion
Internal, dormant fault
SELs (reversible stuck-at faults) may occur because of radiation (e.g., cosmic ray, high energy ions) Satellite on-board computer
Internal, active fault
SEL
Internal, externally-induced fault
Vulnerability Cosmic Ray
External fault
Lack of shielding
Internal, dormant fault
Intrusions result from (at least partially) successful attacks: Computing System
Internal, active fault
Intrusion
Internal, externally-induced fault
Attack
External fault
Vulnerability
account with default password
Error Error
Fault
Fault Treatment
Diagnosis Isolation Reconfiguration
Fault Treatment Fault Treatment
Diagnosis Diagnosis Isolation Isolation Reconfiguration Reconfiguration
Error Processing Error Processing
Detection Detection Damage assessment Damage assessment Recovery Recovery
inexistent or forbidden address, instruction, command… watchdogs error detection code (e.g., parity)
verify properties on:
values (absolute, relative, intervals) formats and types events (instants, delays, sequences)
errors on different replicates
internal hardware fault: identical copies external hardware fault: similar copies design fault / interaction fault: diversified copies
Backward recovery Forward recovery Compensation-based recovery (fault masking) 4 5 6 7 1 2 3 3 12 13 11 1 2 3 1 2 3 1 2 3 4 5 6 7 4 5 6 7
Intrusion into a part of the system should give access only to non-significant information
FRS: Fragmentation-Redundancy-Scattering
Fragmentation: split the data into fragments so that isolated fragments contain no significant information: confidentiality Redundancy: add redundancy so that fragment modification or destruction would not impede legitimate access: integrity + availability Scattering: isolate individual fragments
Error Error
Fault
Fault Treatment
Diagnosis Isolation Reconfiguration
Fault Treatment Fault Treatment
Diagnosis Diagnosis Isolation Isolation Reconfiguration Reconfiguration
Error Processing Error Processing
Detection Detection Damage assessment Damage assessment Recovery Recovery
Malicious- and Accidental-Fault Tolerance for Internet Applications IST Dependability Initiative Cross Program Action 2
Dependability in services and technologies
University of Newcastle (UK)
Brian Randell, Robert Stroud
University of Lisbon (P)
Paulo Verissimo
DSTL, Malvern (UK)
Tom McCutcheon, Colin O’Halloran
University of Saarland (D)
Birgit Pfitzmann
LAAS-CNRS, Toulouse (F)
Yves Deswarte, David Powell
IBM Research, Zurich (CH)
Marc Dacier, Michael Waidner
N°01145, April 2001, 19 p.
Components, in IEEE Symp. on Security and Privacy, Oakland, CA, USA, pp.187-193.
and Japanese, 265p., ISBN 3-211-82296-8, Springer-Verlag, 1992.
Pfitzmann, B. Randell, R. Stroud, P. Veríssimo, M. Waidner. MAFTIA (Malicious- and Accidental-Fault Tolerance for Internet Applications), Sup. of the 2001 International Conference on Dependable Systems and Networks (DSN2001), Göteborg (Suède), 1-4 juillet 2001, IEEE, pp. D-32-D-35.