Recent exploits by hackers have drawn tremendous attention to the issue of defending against potential information warfare (IW) [whi, 2000]. Our defense and civil institutions rely so heavily on their information systems and networks that the prospect of attacks seriously directed at disabling them could be devastating. Yet, as the hacker attacks have demonstrated, protective mechanisms are fallible. Features and services that must be in place to carry out needed, legitimate functions can be abused by being used in unexpected ways to provide an avenue of attack. Further, an attacker who penetrates one system can use its relationships with other systems on the network to compromise them as well. Such experiences have led to the recognition of the need to detect and react to attacks that succeed in breaching a system’s protective mechanisms.
KeywordsIntrusion Detection Integrity Constraint Recovery Method Fault Treatment Recovery Model
Unable to display preview. Download preview PDF.
- 1.For some more spectacular examples, see Peter Neumann’s RISKS digest in the newsgroup news: comp. risks or the archive ftp://ftp.sri.com/risks.