A Comparison of Intrusion-Tolerant System Architectures

被引:20
|
作者
Nguyen, Quyen L. [1 ]
Sood, Arun [1 ]
机构
[1] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
detection-based; Internet; intrusion tolerance; Open Archival Information System; open systems; recovery-based; security and privacy; Web;
D O I
10.1109/MSP.2010.145
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancing sophistication of security attacks, protecting open systems is increasingly challenging. Intrusion tolerance should be part of overall in-depth security. This article compares three types of intrusion-tolerant system architectures. © 2006 IEEE.
引用
收藏
页码:24 / 31
页数:8
相关论文
共 50 条
  • [21] An intrusion-tolerant mechanism for intrusion detection systems
    Kuang, Liwei
    Zulkernine, Mohammad
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 319 - +
  • [22] An architecture for an adaptive intrusion-tolerant server
    Valdes, A
    Almgren, M
    Cheung, S
    Deswarte, Y
    Dutertre, B
    Levy, J
    Saïdi, H
    Stavridou, V
    Uribe, TE
    SECURITY PROTOCOLS, 2004, 2845 : 158 - 177
  • [23] Design of a Lightweight Intrusion-Tolerant System for Highly Available Servers
    Okamoto, Takeshi
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 : 2319 - 2327
  • [24] Secure intrusion-tolerant replication on the Internet
    Cachin, C
    Poritz, JA
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 167 - 176
  • [25] Intrusion-tolerant group management in enclaves
    Dutertre, B
    Saïdi, H
    Stavridou, V
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 203 - 212
  • [26] A Scalable and Intrusion-tolerant Digital Time-stamping System
    Tulone, Daniela
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2357 - 2363
  • [27] Randomized intrusion-tolerant asynchronous services
    Moniz, Henrique
    Neves, Nuno Ferreira
    Correia, Miguel
    Verissimo, Paulo
    DSN 2006 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 568 - 577
  • [28] An architecture for adaptive intrusion-tolerant applications
    Pal, Partha
    Rubel, Paul
    Atighetchi, Michael
    Webber, Franklin
    Sanders, William H.
    Seri, Mouna
    Ramasamy, HariGovind
    Lyons, James
    Courtney, Tod
    Agbaria, Adnan
    Cukier, Michel
    Gossett, Jeanna
    Keidar, Idit
    SOFTWARE-PRACTICE & EXPERIENCE, 2006, 36 (11-12): : 1331 - 1354
  • [29] Building intrusion-tolerant secure software
    Zhang, T
    Zhuang, XT
    Pande, S
    CGO 2005: INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, 2005, : 255 - 266
  • [30] Model-based validation of an intrusion-tolerant information system
    Stevens, F
    Courtney, T
    Singh, S
    Agbaria, A
    Meyer, JF
    Sanders, WH
    Pal, P
    23RD IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2004, : 184 - 194