A Comparison of Intrusion-Tolerant System Architectures

被引:20
|
作者
Nguyen, Quyen L. [1 ]
Sood, Arun [1 ]
机构
[1] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
detection-based; Internet; intrusion tolerance; Open Archival Information System; open systems; recovery-based; security and privacy; Web;
D O I
10.1109/MSP.2010.145
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancing sophistication of security attacks, protecting open systems is increasingly challenging. Intrusion tolerance should be part of overall in-depth security. This article compares three types of intrusion-tolerant system architectures. © 2006 IEEE.
引用
收藏
页码:24 / 31
页数:8
相关论文
共 50 条
  • [41] Survivable SCADA Via Intrusion-Tolerant Replication
    Kirsch, Jonathan
    Goose, Stuart
    Amir, Yair
    Wei, Dong
    Skare, Paul
    IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (01) : 60 - 70
  • [42] Intrusion-Tolerant Server Architecture for Survivable Services
    Byoung Min Joon
    The Journal of Supercomputing, 2005, 33 (1) : 93 - 102
  • [43] Intrusion-tolerant middleware -: The road to automatic security
    Verissimo, Paulo E.
    Neves, Nuno F.
    Cachin, Christian
    Poritz, Jonathan
    Powell, David
    Deswarte, Yves
    Stroud, Robert
    Welch, Ian
    IEEE SECURITY & PRIVACY, 2006, 4 (04) : 54 - 62
  • [44] Formal verification of an intrusion-tolerant group membership protocol
    Ramasamy, HV
    Cukier, M
    Sanders, WH
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2003, E86D (12): : 2612 - 2622
  • [45] Worm-IT -: A wormhole-based intrusion-tolerant group communication system
    Correia, Miguel
    Neves, Nuno Ferreira
    Lung, Lau Cheuk
    Verissimo, Paulo
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) : 178 - 197
  • [46] Intrusion-Tolerant Framework for Heterogeneous Wireless Sensor Networks
    Sliti, Maha
    Hamdi, Mohamed
    Boudriga, Noureddine
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 633 - 636
  • [47] Intrusion-tolerant group management in enclaves -: (Transcript of discussion)
    Saïdi, H
    SECURITY PROTOCOLS, 2002, 2467 : 213 - 216
  • [48] Formal specification and verification of the intrusion-Tolerant enclaves protocol
    Computer Science Department, McGill University, 3480 University Street, Montreal, QC, Canada
    不详
    不详
    Int. J. Netw. Secur., 2007, 3 (288-298):
  • [49] Toward an Intrusion-Tolerant Power Grid: Challenges and Opportunities
    Babay, Amy
    Schultz, John
    Tantillo, Thomas
    Amir, Yair
    2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, : 1321 - 1326
  • [50] Secure and Intrusion-tolerant Communication in Wireless Mesh Networks
    Guo Yuan-bo
    Hao Yao-hui
    Wang Chao
    INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 694 - +