Secure and survivable software systems

A. Krings, P. Oman
{"title":"Secure and survivable software systems","authors":"A. Krings, P. Oman","doi":"10.1109/HICSS.2003.1174907","DOIUrl":null,"url":null,"abstract":"With malicious computer and network attacks reaching epidemic proportions, issues of security and survivability of software systems have surfaced in a variety of application domains. Of real concern is the increasing reliance of critical applications on networked computer systems. Failure or compromises of such systems could cause threats to national infrastructures or lead to catastrophe ( e.g., loss of life, damage to the environment, or unacceptable financial losses). Driven by market speed and feature demand, commercial software developers have high pressures to deliver products rapidly, usually at the expense of quality and security. Given these market pressures and the increasing complexity of today’s software, it is unrealistic to assume total security and robustness. Hence, the research area of secure and survivable systems has addressed the ability of systems to fulfill their missions even in the presence of failures, accidents or malicious attacks. Whereas resilience to failures and accidents has been the focus of research in fault-tolerant systems design, resilience to malicious attacks has become a challenge in the field of system survivability. Principally, essential services must be designed to withstand attacks. This requirement goes beyond the scope of computer and network security, which has been traditionally addressing detection and resistance to attacks.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HICSS.2003.1174907","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

With malicious computer and network attacks reaching epidemic proportions, issues of security and survivability of software systems have surfaced in a variety of application domains. Of real concern is the increasing reliance of critical applications on networked computer systems. Failure or compromises of such systems could cause threats to national infrastructures or lead to catastrophe ( e.g., loss of life, damage to the environment, or unacceptable financial losses). Driven by market speed and feature demand, commercial software developers have high pressures to deliver products rapidly, usually at the expense of quality and security. Given these market pressures and the increasing complexity of today’s software, it is unrealistic to assume total security and robustness. Hence, the research area of secure and survivable systems has addressed the ability of systems to fulfill their missions even in the presence of failures, accidents or malicious attacks. Whereas resilience to failures and accidents has been the focus of research in fault-tolerant systems design, resilience to malicious attacks has become a challenge in the field of system survivability. Principally, essential services must be designed to withstand attacks. This requirement goes beyond the scope of computer and network security, which has been traditionally addressing detection and resistance to attacks.
安全且可生存的软件系统
随着恶意计算机和网络攻击的流行,软件系统的安全性和生存性问题已经在各种应用领域浮出水面。真正令人担忧的是关键应用程序对联网计算机系统的日益依赖。此类系统的故障或破坏可能对国家基础设施造成威胁或导致灾难(例如,生命损失、环境破坏或不可接受的经济损失)。在市场速度和功能需求的驱动下,商业软件开发人员面临着快速交付产品的巨大压力,通常以牺牲质量和安全性为代价。考虑到这些市场压力和当今软件日益增加的复杂性,假设完全安全和健壮性是不现实的。因此,安全和可生存系统的研究领域已经解决了系统在存在故障,事故或恶意攻击的情况下完成其任务的能力。在容错系统设计中,对故障和事故的弹性一直是研究的重点,而对恶意攻击的弹性已成为系统生存能力领域的一个挑战。基本上,基本服务的设计必须能够承受攻击。这一要求超出了计算机和网络安全的范围,传统上,计算机和网络安全一直致力于检测和抵抗攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信