학술논문

Defeating Denial-of-Service Attacks in a Self-Managing N-Variant System
Document Type
Conference
Source
2019 IEEE/ACM 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS) Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2019 IEEE/ACM 14th International Symposium on. :126-138 May, 2019
Subject
Computing and Processing
DNA
Microorganisms
Immune system
Proteins
Denial-of-service attack
Genomics
Adaptive systems
adaptive systems, security, software systems
Language
ISSN
2157-2321
Abstract
N-variant systems protect software from attack by executing multiple variants of a single program in parallel, checking regularly that they are behaving consistently. The variants are designed to behave identically during normal operation and differently during an attack. When different behavior (divergence) is detected, N-variant systems self-heal by either rolling back to a safe state or restarting. Unfortunately, an attacker can create a denial-of-service (DoS) attack from a diverging input by using it to force an N-variant system into an endless diverge/restart cycle. This paper describes a defense, CRISPR-Inspired Program Resiliency (Crispy), that automatically protects N-variant systems from such DoS attacks. Crispy mitigates DoS attacks against N-variant systems using an automatic signature generation technique modeled on CRISPR/Cas, the bacterial adaptive immune system. Experiments on two webservers using exploits developed by an independent Red Team showed Crispy protected against 87.5% of DoS attacks with zero false positives. Overhead was minimal and varied according to the number of signatures maintained, which can be tailored to the threat model and performance requirements.