Intrusion detection by random dispersion and voting on redundant Web server operations
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002. === Includes bibliographical references (p. 126-128). === Until now, conventional approaches to the problem of computer security and intrusion tolerance have either tried to block intr...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | English |
Published: |
Massachusetts Institute of Technology
2005
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/8112 |
id |
ndltd-MIT-oai-dspace.mit.edu-1721.1-8112 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-MIT-oai-dspace.mit.edu-1721.1-81122019-05-02T15:53:27Z Intrusion detection by random dispersion and voting on redundant Web server operations Kwon, Dennis Oshuk, 1979- William Weinstein and Howard E. Shrobe. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002. Includes bibliographical references (p. 126-128). Until now, conventional approaches to the problem of computer security and intrusion tolerance have either tried to block intrusions altogether, or have tried to detect an intrusion in progress and stop it before the execution of malicious code could damage the system or cause it to send corrupted data back to the client. The goal of this thesis is to explore the question of whether voting, in conjunction with several key concepts from the study of fault-tolerant computing - namely masking, redundancy, and dispersion - can be effectively implemented and used to confront the issues of detecting and handling such abnormalities within the system. Such a mechanism would effectively provide a powerful tool for any high-security system where it could be used to catch and eliminate the majority of all intrusions before they were able to cause substantial damage to the system. There are a number of subgoals that pertain to the issue of voting. The most significant are those of syntactic equivalence and tagging. Respectively, these deal with the issues of determining the true equivalence of two objects to be voted on, and "marking" multiple redundant copies of a single transaction such that they can be associated at a later time. Both of these subgoals must be thoroughly examined in order to design the optimal voting system. The results of this research were tested in a simulation environment. A series of intrusions were then run on the voting system to measure its performance. The outcome of these tests and any gains in intrusion tolerance were documented accordingly. by Dennis Oshuk Kwon. M.Eng. 2005-08-24T20:26:03Z 2005-08-24T20:26:03Z 2002 2002 Thesis http://hdl.handle.net/1721.1/8112 51479509 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 128 p. 8547782 bytes 8547540 bytes application/pdf application/pdf application/pdf Massachusetts Institute of Technology |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
Electrical Engineering and Computer Science. |
spellingShingle |
Electrical Engineering and Computer Science. Kwon, Dennis Oshuk, 1979- Intrusion detection by random dispersion and voting on redundant Web server operations |
description |
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002. === Includes bibliographical references (p. 126-128). === Until now, conventional approaches to the problem of computer security and intrusion tolerance have either tried to block intrusions altogether, or have tried to detect an intrusion in progress and stop it before the execution of malicious code could damage the system or cause it to send corrupted data back to the client. The goal of this thesis is to explore the question of whether voting, in conjunction with several key concepts from the study of fault-tolerant computing - namely masking, redundancy, and dispersion - can be effectively implemented and used to confront the issues of detecting and handling such abnormalities within the system. Such a mechanism would effectively provide a powerful tool for any high-security system where it could be used to catch and eliminate the majority of all intrusions before they were able to cause substantial damage to the system. There are a number of subgoals that pertain to the issue of voting. The most significant are those of syntactic equivalence and tagging. Respectively, these deal with the issues of determining the true equivalence of two objects to be voted on, and "marking" multiple redundant copies of a single transaction such that they can be associated at a later time. Both of these subgoals must be thoroughly examined in order to design the optimal voting system. The results of this research were tested in a simulation environment. A series of intrusions were then run on the voting system to measure its performance. The outcome of these tests and any gains in intrusion tolerance were documented accordingly. === by Dennis Oshuk Kwon. === M.Eng. |
author2 |
William Weinstein and Howard E. Shrobe. |
author_facet |
William Weinstein and Howard E. Shrobe. Kwon, Dennis Oshuk, 1979- |
author |
Kwon, Dennis Oshuk, 1979- |
author_sort |
Kwon, Dennis Oshuk, 1979- |
title |
Intrusion detection by random dispersion and voting on redundant Web server operations |
title_short |
Intrusion detection by random dispersion and voting on redundant Web server operations |
title_full |
Intrusion detection by random dispersion and voting on redundant Web server operations |
title_fullStr |
Intrusion detection by random dispersion and voting on redundant Web server operations |
title_full_unstemmed |
Intrusion detection by random dispersion and voting on redundant Web server operations |
title_sort |
intrusion detection by random dispersion and voting on redundant web server operations |
publisher |
Massachusetts Institute of Technology |
publishDate |
2005 |
url |
http://hdl.handle.net/1721.1/8112 |
work_keys_str_mv |
AT kwondennisoshuk1979 intrusiondetectionbyrandomdispersionandvotingonredundantwebserveroperations |
_version_ |
1719030880221003776 |