Intrusion detection by random dispersion and voting on redundant Web server operations

Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002. === Includes bibliographical references (p. 126-128). === Until now, conventional approaches to the problem of computer security and intrusion tolerance have either tried to block intr...

Full description

Bibliographic Details
Main Author: Kwon, Dennis Oshuk, 1979-
Other Authors: William Weinstein and Howard E. Shrobe.
Format: Others
Language:English
Published: Massachusetts Institute of Technology 2005
Subjects:
Online Access:http://hdl.handle.net/1721.1/8112
id ndltd-MIT-oai-dspace.mit.edu-1721.1-8112
record_format oai_dc
spelling ndltd-MIT-oai-dspace.mit.edu-1721.1-81122019-05-02T15:53:27Z Intrusion detection by random dispersion and voting on redundant Web server operations Kwon, Dennis Oshuk, 1979- William Weinstein and Howard E. Shrobe. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002. Includes bibliographical references (p. 126-128). Until now, conventional approaches to the problem of computer security and intrusion tolerance have either tried to block intrusions altogether, or have tried to detect an intrusion in progress and stop it before the execution of malicious code could damage the system or cause it to send corrupted data back to the client. The goal of this thesis is to explore the question of whether voting, in conjunction with several key concepts from the study of fault-tolerant computing - namely masking, redundancy, and dispersion - can be effectively implemented and used to confront the issues of detecting and handling such abnormalities within the system. Such a mechanism would effectively provide a powerful tool for any high-security system where it could be used to catch and eliminate the majority of all intrusions before they were able to cause substantial damage to the system. There are a number of subgoals that pertain to the issue of voting. The most significant are those of syntactic equivalence and tagging. Respectively, these deal with the issues of determining the true equivalence of two objects to be voted on, and "marking" multiple redundant copies of a single transaction such that they can be associated at a later time. Both of these subgoals must be thoroughly examined in order to design the optimal voting system. The results of this research were tested in a simulation environment. A series of intrusions were then run on the voting system to measure its performance. The outcome of these tests and any gains in intrusion tolerance were documented accordingly. by Dennis Oshuk Kwon. M.Eng. 2005-08-24T20:26:03Z 2005-08-24T20:26:03Z 2002 2002 Thesis http://hdl.handle.net/1721.1/8112 51479509 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 128 p. 8547782 bytes 8547540 bytes application/pdf application/pdf application/pdf Massachusetts Institute of Technology
collection NDLTD
language English
format Others
sources NDLTD
topic Electrical Engineering and Computer Science.
spellingShingle Electrical Engineering and Computer Science.
Kwon, Dennis Oshuk, 1979-
Intrusion detection by random dispersion and voting on redundant Web server operations
description Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002. === Includes bibliographical references (p. 126-128). === Until now, conventional approaches to the problem of computer security and intrusion tolerance have either tried to block intrusions altogether, or have tried to detect an intrusion in progress and stop it before the execution of malicious code could damage the system or cause it to send corrupted data back to the client. The goal of this thesis is to explore the question of whether voting, in conjunction with several key concepts from the study of fault-tolerant computing - namely masking, redundancy, and dispersion - can be effectively implemented and used to confront the issues of detecting and handling such abnormalities within the system. Such a mechanism would effectively provide a powerful tool for any high-security system where it could be used to catch and eliminate the majority of all intrusions before they were able to cause substantial damage to the system. There are a number of subgoals that pertain to the issue of voting. The most significant are those of syntactic equivalence and tagging. Respectively, these deal with the issues of determining the true equivalence of two objects to be voted on, and "marking" multiple redundant copies of a single transaction such that they can be associated at a later time. Both of these subgoals must be thoroughly examined in order to design the optimal voting system. The results of this research were tested in a simulation environment. A series of intrusions were then run on the voting system to measure its performance. The outcome of these tests and any gains in intrusion tolerance were documented accordingly. === by Dennis Oshuk Kwon. === M.Eng.
author2 William Weinstein and Howard E. Shrobe.
author_facet William Weinstein and Howard E. Shrobe.
Kwon, Dennis Oshuk, 1979-
author Kwon, Dennis Oshuk, 1979-
author_sort Kwon, Dennis Oshuk, 1979-
title Intrusion detection by random dispersion and voting on redundant Web server operations
title_short Intrusion detection by random dispersion and voting on redundant Web server operations
title_full Intrusion detection by random dispersion and voting on redundant Web server operations
title_fullStr Intrusion detection by random dispersion and voting on redundant Web server operations
title_full_unstemmed Intrusion detection by random dispersion and voting on redundant Web server operations
title_sort intrusion detection by random dispersion and voting on redundant web server operations
publisher Massachusetts Institute of Technology
publishDate 2005
url http://hdl.handle.net/1721.1/8112
work_keys_str_mv AT kwondennisoshuk1979 intrusiondetectionbyrandomdispersionandvotingonredundantwebserveroperations
_version_ 1719030880221003776