Open-source Security Software Security for Open-source Systems
ثبت نشده
چکیده
S ome people have claimed that open-source software is intrinsically more secure than closed source, 1 and others have claimed that it's not. 2 Neither case is absolutely true: they are essentially flip sides of the same coin. Open source gives both attackers and defenders greater analytic power to do something about software vulnerabilities. If the defender does nothing about security, though, open source just gives that advantage away to the attacker. However, open source also offers great advantages to the defender, giving access to security techniques that are normally infeasible with closed-source software. Closed source forces users to accept the level of security diligence that the vendor chooses to provide, whereas open source lets users (or other collectives of people) raise the bar on security as high as they want to push it. This article surveys security enhancements that take advantage of the nature of open-source software. We'll concentrate on software security (mitigation of vulnerabilities in software), not network security (which is dealt with in terms of line protocols and is thus unaffected by whether other network components are open source). All the solutions that we'll consider apply to open-source systems, but they may not be entirely open source themselves. Software security is fundamentally simple: just run perfect software. Being that perfect software is infeasible for non-trivial systems, we must find other means to ascertain that large, complex, probably vulnerable software does what it should do and nothing else. classify methods that ensure and enforce the " nothing else " part into three broad categories: • Software auditing, which prevents vulnerabilities by searching for them ahead of time, with or without automatic analysis • Vulnerability mitigation, which are compile-time techniques that stop bugs at runtime • Behavior management, which are operating system features that either limit potential damage or block specific behaviors known to be dangerous Software auditing The least damaging software vulnerability is the one that never happens. Thus, it is optimal if we can prevent vul-nerabilities by auditing software for flaws from the start. Similarly, it is near optimal to audit existing applications for flaws and remove them before attackers discover and exploit them. Open source is ideal in this capacity, because it enables anyone to audit the source code at will and productively share the results of such audits with the world. The problem with this approach is that auditing source code for correctness, or even …
منابع مشابه
Security Concerns in Using Open Source Software for Enterprise Requirements
Information security is the biggest challenge for network and ecurity administrators. The security of a given network highly depends o the software used and the administrative practices followed for operating systems, perimeter security, antivirus protection, intrusion detection, software development, systems and network monitoring, corporate mail, office productivity and so on. The rapid growt...
متن کاملDesigning Secure Systems Based on Open Architectures with Open Source and Closed Source Components
The development and evolution of secure open architecture systems has received insufficient consideration. Such systems are composed of both open source and closed software software components subject to different security requirements in an architecture in which evolution can occur by evolving existing components, replacing them, or refactoring their interfaces, interconnections and configurat...
متن کاملOpen Source Security Analysis - Evaluating Security of Open Source vs. Closed Source Operating Systems
Open source software is becoming a major trend in the software industry. Operating systems (OS), Internet servers and several other software applications are available under this licensing conditions. This article assesses the security of open source technology, namely the Linux OS. Since a growing number of critical enterprise information systems are starting to use Linux OS, this evaluation c...
متن کاملAn Empirical Analysis of Exploitation Attempts Based on Vulnerabilities in Open Source Software
For open source software, security attention frequently focuses on the discovery of vulnerabilities prior to release. The large number of diverse people who view the source code may find vulnerabilities before the software product is release. Therefore, open source software has the potential to be more secure than closed source software. Unfortunately, for vulnerabilities found after release, t...
متن کاملThe Open Source approach opportunities and limitations with respect to security and privacy
TodayÕs software often does not even fulfil basic security or privacy requirements. Some people regard the open source paradigm as the solution to this problem. First, we carefully explain the security and privacy aspects of open source, which in particular offer the possibility for a dramatic increase in trustworthiness for and autonomy of the user. We show which expectations for an improvemen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003