Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

The Design of a Generic Intrusion-Tolerant Architecture for Web Servers

Published: 01 January 2009 Publication History

Abstract

Nowadays, more and more information systems are connected to the Internet and offer Web interfaces to the general public or to a restricted set of users. Such openness makes them likely targets for intruders, and conventional protection techniques have been shown insufficient to prevent all intrusions in such open systems. This paper proposes a generic architecture to implement intrusion-tolerant Web servers. This architecture is based on redundancy and diversification principles, in order to increase the system resilience to attacks: usually, an attack targets a particular software, running on a particular platform, and fails on others. The architecture is composed of redundant proxies that mediate client requests to a redundant bank of diversified COTS\footnote{Commercial Off The Shelf.} application servers. The redundancy is deployed here to increase system availability and integrity. To improve performance, adaptive redundancy is applied: the redundancy level is selected according to the current alert level. The architecture can be used for static servers, i.e., for Web distribution of stable information (updated off-line), as well as for fully dynamic systems where information updates are executed immediately on an on-line database. The feasibility of this architecture has been demonstrated by implementing an example of a travel agency Web server.

Cited By

View all
  • (2023)Machine Learning Based Resilience Testing of an Address Randomization Cyber DefenseIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.323456120:6(4853-4867)Online publication date: 1-Nov-2023
  • (2022)Redundancy–Based Intrusion Tolerance Approaches Moving from Classical Fault Tolerance MethodsInternational Journal of Applied Mathematics and Computer Science10.34768/amcs-2022-004832:4(701-719)Online publication date: 1-Dec-2022
  • (2022)Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day AttacksComputer Security - ESORICS 201410.1007/978-3-319-11212-1_28(494-511)Online publication date: 10-Mar-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing  Volume 6, Issue 1
January 2009
80 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 January 2009

Author Tags

  1. Security
  2. Web servers
  3. and protection
  4. integrity

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Machine Learning Based Resilience Testing of an Address Randomization Cyber DefenseIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.323456120:6(4853-4867)Online publication date: 1-Nov-2023
  • (2022)Redundancy–Based Intrusion Tolerance Approaches Moving from Classical Fault Tolerance MethodsInternational Journal of Applied Mathematics and Computer Science10.34768/amcs-2022-004832:4(701-719)Online publication date: 1-Dec-2022
  • (2022)Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day AttacksComputer Security - ESORICS 201410.1007/978-3-319-11212-1_28(494-511)Online publication date: 10-Mar-2022
  • (2019)Threat Management in Data-centric IoT-Based Collaborative SystemsACM Transactions on Internet Technology10.1145/332323219:3(1-19)Online publication date: 27-Aug-2019
  • (2018)Path HoppingSecurity and Communication Networks10.1155/2018/84758182018Online publication date: 7-May-2018
  • (2018)DuoSecurity and Communication Networks10.1155/2018/67510422018Online publication date: 1-Jan-2018
  • (2018)Catch Me If You CanProceedings of the 5th ACM Workshop on Moving Target Defense10.1145/3268966.3268970(31-39)Online publication date: 15-Oct-2018
  • (2017)Design of a Lightweight Intrusion-Tolerant System for Highly Available ServersProcedia Computer Science10.1016/j.procs.2017.08.261112:C(2319-2327)Online publication date: 1-Sep-2017
  • (2014)Comparing Different Moving Target Defense TechniquesProceedings of the First ACM Workshop on Moving Target Defense10.1145/2663474.2663486(97-107)Online publication date: 7-Nov-2014
  • (2014)A Game Theoretic Approach to Strategy Determination for Dynamic Platform DefensesProceedings of the First ACM Workshop on Moving Target Defense10.1145/2663474.2663478(21-30)Online publication date: 7-Nov-2014
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media