Security analysis on the proactivized system against latent virus attacks (English)

In: Transactions of the Information Processing Society of Japan   ;  41 ,  8  ;  2228-2236  ;  2000
  • ISSN:
  • Article (Journal)  /  Print

How to get this document?

The notion of proactive security of basic primitives and cryptosystems was introduced in order to tolerate a very strong mobile adversary. However, even though proactive maintenance is employed, it is a hard problem to detect the viruses which are skillfully developed and latent in the memory of servers. We introduce a new type of virus attacks, called latent virus attack, in which viruses reside in the intruded server and wait for the chance for viruses colluding with each other to intrude more than the threshold of servers. We analyze the resilience of the proactive system against latent virus attacks and present how to enhance the security against such virus attacks. At first, the robustness of proactivized systems against this attack is estimated by probabilistic analysis. Next, in order to enhance the resilience against such virus attacks, we introduce an active rebooting approach, in which the reboot procedure on a predetermined number of servers is performed in the total independence of servers being infected or not. The effectiveness is also evaluated. As far as we know, this work is the first proposal for enhancing the robustness of a proactive system against latent virus attacks.

Table of contents – Volume 41, Issue 8

Show all volumes and issues

The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.

2068
Generating shared RSA parameters for two communicating parties
Barmawi, A.M. / Takada, S. / Doi, N. | 2000
2092
Efficient construction of elliptic curves over optimal extension-field
Futa, Y. / Miyaji, A. | 2000
2102
The secure renewal of cryptosystems in the open network architecture
Yamada, T. / Miyaji, A. / Soshi, M. | 2000
2148
Anonymous communication with elementary cyclic routes
Kitazawa, S. / Nagano, S. / Soshi, M. / Miyaji, A. | 2000
2208
Applying legitimate access database for MLSI-based intrusion detection
Harada, S. / Asaka, M. | 2000
2228
Security analysis on the proactivized system against latent virus attacks
Watanabe, Y. / Imai, H. | 2000
2237
Software-based music delivery platform
Uda, R. / Sunada, A. / Inoue, A. / Shigeno, H. / Matsushita, Y. | 2000
2264
An optimal decision method for establishment of security objectives
Nagai, Y. / Fujiyama, T. / Sasaki, R. | 2000
2327
A macro system with class objects for the Java language
Tatsubori, M. / Chiba, S. / Itano, K. | 2000
Feedback