Transshipment (information security)

For Transshipment in the logistics industry, see Transshipment.

In information security, transshipment is a technique for protecting software services and applications by ensuring they only receive data that they are known to be able to handle safely. The term is analogous to that in the logistics industry where cargo is offloaded from one means of transport and on to another at a port of entry. With transshipment, information is extracted from the data used to send it and then encoded as data that can be handled safely.

Method

With transshipment,[1] messages are intercepted and the business information they carry is extracted. This information is then encoded in a new message using a data format that the receiving application can safely handle.

Example

For example, an email client may be known to handle messages with a simple structure without failure but not the full generality allowed by the standards. Transshipment can then be used to protect the mail client from attackers who can exploit weaknesses in its ability to handle the general case. The transshipment process extracts the business information in the email messages and creates a new message that conveys the same information but using simple structures. So the mail client is protected without knowing details of any weaknesses in its implementation.

Implementation

The transshipment function must handle any and all data sent to it by potential attackers. To be useful the function must be implemented without it being vulnerable to attack. This can be achieved by using Guard technology that separates the implementation into three parts - a destination proxy that interacts with the message originator and extracts the business information from messages, a verifier and a source proxy that creates a new message to carry the business information and interacts with the message recipient. The verifier's role is to ensure that the source proxy is only presented with the business information using the simple data format it is expecting. As a result, the attack surface is limited to the verifier's interface and that part of the source proxy's interface which is visible through the verifier.

Advantages

Unlike antivirus software the use of transshipment defends against unknown attacks, and hence zero-day attacks, and does not require routine updates to signatures or Heuristics.

References

This article is issued from Wikipedia - version of the 10/5/2014. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.