the starfish system intrusion detection and intrusion tolerance for middleware systems l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
The Starfish System: Intrusion Detection and Intrusion Tolerance for Middleware Systems PowerPoint Presentation
Download Presentation
The Starfish System: Intrusion Detection and Intrusion Tolerance for Middleware Systems

Loading in 2 Seconds...

play fullscreen
1 / 23

The Starfish System: Intrusion Detection and Intrusion Tolerance for Middleware Systems - PowerPoint PPT Presentation


  • 358 Views
  • Uploaded on

The Starfish System: Intrusion Detection and Intrusion Tolerance for Middleware Systems Kim Potter Kihlstrom Westmont College Santa Barbara, CA, USA Priya Narasimhan Carnegie Mellon University Pittsburgh, PA, USA Motivation Previous work SecureRing [ACM TISSEC 2001] Eternal [TAPOS 1998]

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'The Starfish System: Intrusion Detection and Intrusion Tolerance for Middleware Systems' - emily


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
the starfish system intrusion detection and intrusion tolerance for middleware systems

The Starfish System:Intrusion Detection and Intrusion Tolerance for Middleware Systems

Kim Potter Kihlstrom

Westmont College

Santa Barbara, CA, USA

Priya Narasimhan

Carnegie Mellon University

Pittsburgh, PA, USA

motivation
Motivation
  • Previous work
    • SecureRing [ACM TISSEC 2001]
    • Eternal [TAPOS 1998]
    • Immune [ICDCS 1999]
    • Byzantine fault detectors [Computer Journal 2003]
  • Insights and lessons learned
    • Cost of survivability
    • Replication of objects
    • Input and output majority voting
    • Guarantees of underlying multicast protocol
    • Detection and removal of faulty processors/replicas

Kihlstrom and Narasimhan

immune looking back
Immune: Looking Back

Majority voting

Secure multicast protocols

  • Interception
  • Replication

Kihlstrom and Narasimhan

immune looking ahead
Immune: Looking Ahead
  • Issues left open
    • Scalability
      • Increasing number of objects
      • Increasing number of processors
      • Local area to wide area
      • Bandwidth
    • Survivability of Immune itself
    • Voting
    • Other middleware systems besides CORBA
  • Led to development of Starfish

Kihlstrom and Narasimhan

starfish goals
Starfish Goals
  • Intrusion detection and intrusion tolerance for middleware applications
    • Not specific to any middleware system
  • Infrastructural support for majority voting
  • End-to-end intrusion detection
  • Applicable to local and wide area systems
  • Currently under development

Kihlstrom and Narasimhan

starfish organization
Starfish Organization

Kihlstrom and Narasimhan

starfish philosophy
Starfish Philosophy
  • Central core
    • Highly secure
    • Tightly coupled
  • Arms
    • Less tightly coupled
    • Less stringent security guarantees
    • Can be removed in event of security compromise
    • New arms can be grown

Kihlstrom and Narasimhan

starfish structure
Starfish Structure

Kihlstrom and Narasimhan

system model
System Model
  • Assumptions
    • Distributed object system
    • Asynchronous
    • Determinism
  • Faults
    • Communication
    • Processor
    • Object

Kihlstrom and Narasimhan

support for voting
Support for Voting
  • Objects are replicated
  • Replica consistency in event of malicious processor and object replica faults
  • Object group abstraction

Kihlstrom and Narasimhan

support for voting11
Support for Voting
  • Voting in a dynamic environment
  • Knowledge of how many votes constitute a majority
  • Voter must know the number of replicas in the originating object group
  • Hierarchical membership structure
    • Object groups and voting groups

Kihlstrom and Narasimhan

support for voting12
Support for Voting

Kihlstrom and Narasimhan

end to end intrusion detection
End-to-End Intrusion Detection
  • Removal of faulty replica from object group and all voting groups
  • To remove a faulty replica, all replicas in object group must receive evidence of value fault
  • Special Value_Fault_Vote message
  • Value fault detector

Kihlstrom and Narasimhan

end to end intrusion detection14
End-to-End Intrusion Detection

Kihlstrom and Narasimhan

end to end intrusion detection15
End-to-End Intrusion Detection

Kihlstrom and Narasimhan

end to end intrusion detection16
End-to-End Intrusion Detection

Kihlstrom and Narasimhan

end to end intrusion detection17
End-to-End Intrusion Detection

Kihlstrom and Narasimhan

end to end intrusion detection18
End-to-End Intrusion Detection

Kihlstrom and Narasimhan

end to end intrusion detection19
End-to-End Intrusion Detection
  • Removal of processor hosting faulty replica from system
  • Byzantine fault detector
  • To remove the processor, all processors must vote locally on the same set of votes
  • Special base group
  • Problem with cascading: fault must be handled first at the object level

Kihlstrom and Narasimhan

survivability in starfish
Survivability in Starfish

Kihlstrom and Narasimhan

conclusions
Conclusions
  • Development underway
  • Prior experience in building systems
    • SecureRing
    • Eternal
    • Immune
  • Take insights and lessons in building next generation survivable object system: Starfish

Kihlstrom and Narasimhan

starfish
Starfish
  • Intrusion detection and intrusion tolerance for middleware applications
    • Not specific to any middleware system
  • Infrastructural support for majority voting
  • End-to-end intrusion detection
  • Applicable to local and wide area systems

Kihlstrom and Narasimhan

questions and feedback
Questions and Feedback

Kim Potter Kihlstrom

kimkihls@westmont.edu

http://homepage.westmont.edu/~kimkihls/

Priya Narasimhan

priya@cs.cmu.edu

http://www.cs.cmu.edu/~priya/

Kihlstrom and Narasimhan