{"title":"海星系统:为中间件系统提供入侵检测和入侵容忍","authors":"K. Kihlstrom, P. Narasimhan","doi":"10.1109/WORDS.2003.1218083","DOIUrl":null,"url":null,"abstract":"We introduce the Starfish system, a new system that provides intrusion detection and intrusion tolerance for middleware applications operating in an asynchronous distributed system. The Starfish system contains a central, highly secure and tightly coupled core. This core is augmented by \"arms\" that are less tightly coupled and that have less stringent security guarantees, each of which can be removed from the core if a significant security breach occurs. New arms can be \"grown\" as needed. The Starfish system employs a number of techniques for providing intrusion detection and intrusion tolerance. The specific challenges that we address are infrastructural support for voting and end-to-end intrusion detection.","PeriodicalId":225796,"journal":{"name":"Proceedings of the Eighth International Workshop on Object-Oriented Real-Time Dependable Systems, 2003. (WORDS 2003).","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"The Starfish system: providing intrusion detection and intrusion tolerance for middleware systems\",\"authors\":\"K. Kihlstrom, P. Narasimhan\",\"doi\":\"10.1109/WORDS.2003.1218083\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We introduce the Starfish system, a new system that provides intrusion detection and intrusion tolerance for middleware applications operating in an asynchronous distributed system. The Starfish system contains a central, highly secure and tightly coupled core. This core is augmented by \\\"arms\\\" that are less tightly coupled and that have less stringent security guarantees, each of which can be removed from the core if a significant security breach occurs. New arms can be \\\"grown\\\" as needed. The Starfish system employs a number of techniques for providing intrusion detection and intrusion tolerance. The specific challenges that we address are infrastructural support for voting and end-to-end intrusion detection.\",\"PeriodicalId\":225796,\"journal\":{\"name\":\"Proceedings of the Eighth International Workshop on Object-Oriented Real-Time Dependable Systems, 2003. (WORDS 2003).\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-08-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Eighth International Workshop on Object-Oriented Real-Time Dependable Systems, 2003. (WORDS 2003).\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WORDS.2003.1218083\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Eighth International Workshop on Object-Oriented Real-Time Dependable Systems, 2003. (WORDS 2003).","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WORDS.2003.1218083","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Starfish system: providing intrusion detection and intrusion tolerance for middleware systems
We introduce the Starfish system, a new system that provides intrusion detection and intrusion tolerance for middleware applications operating in an asynchronous distributed system. The Starfish system contains a central, highly secure and tightly coupled core. This core is augmented by "arms" that are less tightly coupled and that have less stringent security guarantees, each of which can be removed from the core if a significant security breach occurs. New arms can be "grown" as needed. The Starfish system employs a number of techniques for providing intrusion detection and intrusion tolerance. The specific challenges that we address are infrastructural support for voting and end-to-end intrusion detection.