Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks

  • Authors:
  • Yuji Watanabe;Hideki Imai

  • Affiliations:
  • -;-

  • Venue:
  • ISW '99 Proceedings of the Second International Workshop on Information Security
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract

The notion of proactive security of basic primitives and cryptosystems was introduced in order to tolerate a very strong "mobile adversary[1][2][3][4]". However, even though proactive maintenance is employed, it is a hard problem to detect the viruses which are skillfully developed and latent in the memory of servers. We introduce a new type of virus attacks, called latent virus attack, in which viruses reside in the intruded server and wait for the chance for viruses colluding with each other to intrude more than the threshold of servers. The main subject of this paper is to analyze the resilience of proactive system against latent virus attacks and present how to enhance the security against such virus attacks. At first, we estimate the robustness of proactivized systems against this attack by probabilistic analysis. As a result, we show that if the virus detection rate is higher than a certain threshold, it is possible for proactive maintenance to make the system robust, while, if less than the threshold, the failure probability of the system is dependent only on the virus infection rate. In order to enhance the resilience against such virus attacks, we propose the notion of active rebooting, in which the system performs the reboot procedure on a predetermined number of servers in the total independence of servers being infected or not. We estimate the security of proactive maintenance with active rebooting by extending the probabilistic model of proactive maintenance. As a result, we show that active rebooting enables us not only to enhance the security against the viruses with higher infection rate, but also to make the system robust even in the case of a low detection rate. Moreover, we show that it is effective even in the case the number of servers which are forced to carry out the reboot operation every update phase is comparatively small.