OS diversity for intrusion tolerance: Myth or reality?

Bibliographic Details
Main Author: Garcia M.
Publication Date: 2011
Other Authors: Bessani A., Gashi I., Neves N., Obelheiro, Rafael Rodrigues
Format: Conference object
Language: eng
Source: Repositório Institucional da Udesc
dARK ID: ark:/33523/0013000006v6n
Download full: https://repositorio.udesc.br/handle/UDESC/9488
Summary: One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity. To what extent failure diversity is observed in practical deployment depends on how diverse are the components that constitute the system. In this paper we present a study with operating systems (OS) vulnerability data from the NIST National Vulnerability Database. We have analyzed the vulnerabilities of 11 different OSes over a period of roughly 15 years, to check how many of these vulnerabilities occur in more than one OS. We found this number to be low for several combinations of OSes. Hence, our analysis provides a strong indication that building a system with diverse OSes may be a useful technique to improve its intrusion tolerance capabilities. © 2011 IEEE.
id UDESC-2_d32c0605b0e69a56705637c9de1868e0
oai_identifier_str oai:repositorio.udesc.br:UDESC/9488
network_acronym_str UDESC-2
network_name_str Repositório Institucional da Udesc
repository_id_str 6391
spelling OS diversity for intrusion tolerance: Myth or reality?One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity. To what extent failure diversity is observed in practical deployment depends on how diverse are the components that constitute the system. In this paper we present a study with operating systems (OS) vulnerability data from the NIST National Vulnerability Database. We have analyzed the vulnerabilities of 11 different OSes over a period of roughly 15 years, to check how many of these vulnerabilities occur in more than one OS. We found this number to be low for several combinations of OSes. Hence, our analysis provides a strong indication that building a system with diverse OSes may be a useful technique to improve its intrusion tolerance capabilities. © 2011 IEEE.2024-12-06T19:12:20Z2011info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/conferenceObjectp. 383 - 39410.1109/DSN.2011.5958251https://repositorio.udesc.br/handle/UDESC/9488ark:/33523/0013000006v6nProceedings of the International Conference on Dependable Systems and NetworksGarcia M.Bessani A.Gashi I.Neves N.Obelheiro, Rafael Rodriguesengreponame:Repositório Institucional da Udescinstname:Universidade do Estado de Santa Catarina (UDESC)instacron:UDESCinfo:eu-repo/semantics/openAccess2024-12-07T21:03:10Zoai:repositorio.udesc.br:UDESC/9488Biblioteca Digital de Teses e Dissertaçõeshttps://pergamumweb.udesc.br/biblioteca/index.phpPRIhttps://repositorio-api.udesc.br/server/oai/requestri@udesc.bropendoar:63912024-12-07T21:03:10Repositório Institucional da Udesc - Universidade do Estado de Santa Catarina (UDESC)false
dc.title.none.fl_str_mv OS diversity for intrusion tolerance: Myth or reality?
title OS diversity for intrusion tolerance: Myth or reality?
spellingShingle OS diversity for intrusion tolerance: Myth or reality?
Garcia M.
title_short OS diversity for intrusion tolerance: Myth or reality?
title_full OS diversity for intrusion tolerance: Myth or reality?
title_fullStr OS diversity for intrusion tolerance: Myth or reality?
title_full_unstemmed OS diversity for intrusion tolerance: Myth or reality?
title_sort OS diversity for intrusion tolerance: Myth or reality?
author Garcia M.
author_facet Garcia M.
Bessani A.
Gashi I.
Neves N.
Obelheiro, Rafael Rodrigues
author_role author
author2 Bessani A.
Gashi I.
Neves N.
Obelheiro, Rafael Rodrigues
author2_role author
author
author
author
dc.contributor.author.fl_str_mv Garcia M.
Bessani A.
Gashi I.
Neves N.
Obelheiro, Rafael Rodrigues
description One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity. To what extent failure diversity is observed in practical deployment depends on how diverse are the components that constitute the system. In this paper we present a study with operating systems (OS) vulnerability data from the NIST National Vulnerability Database. We have analyzed the vulnerabilities of 11 different OSes over a period of roughly 15 years, to check how many of these vulnerabilities occur in more than one OS. We found this number to be low for several combinations of OSes. Hence, our analysis provides a strong indication that building a system with diverse OSes may be a useful technique to improve its intrusion tolerance capabilities. © 2011 IEEE.
publishDate 2011
dc.date.none.fl_str_mv 2011
2024-12-06T19:12:20Z
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/conferenceObject
format conferenceObject
status_str publishedVersion
dc.identifier.uri.fl_str_mv 10.1109/DSN.2011.5958251
https://repositorio.udesc.br/handle/UDESC/9488
dc.identifier.dark.fl_str_mv ark:/33523/0013000006v6n
identifier_str_mv 10.1109/DSN.2011.5958251
ark:/33523/0013000006v6n
url https://repositorio.udesc.br/handle/UDESC/9488
dc.language.iso.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv Proceedings of the International Conference on Dependable Systems and Networks
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv p. 383 - 394
dc.source.none.fl_str_mv reponame:Repositório Institucional da Udesc
instname:Universidade do Estado de Santa Catarina (UDESC)
instacron:UDESC
instname_str Universidade do Estado de Santa Catarina (UDESC)
instacron_str UDESC
institution UDESC
reponame_str Repositório Institucional da Udesc
collection Repositório Institucional da Udesc
repository.name.fl_str_mv Repositório Institucional da Udesc - Universidade do Estado de Santa Catarina (UDESC)
repository.mail.fl_str_mv ri@udesc.br
_version_ 1842258094855290880