A Comparison of Intrusion-Tolerant System Architectures

被引:20
|
作者
Nguyen, Quyen L. [1 ]
Sood, Arun [1 ]
机构
[1] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
detection-based; Internet; intrusion tolerance; Open Archival Information System; open systems; recovery-based; security and privacy; Web;
D O I
10.1109/MSP.2010.145
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancing sophistication of security attacks, protecting open systems is increasingly challenging. Intrusion tolerance should be part of overall in-depth security. This article compares three types of intrusion-tolerant system architectures. © 2006 IEEE.
引用
收藏
页码:24 / 31
页数:8
相关论文
共 50 条
  • [1] Intrusion-tolerant architectures:: Concepts and design
    Veríssimo, PE
    Neves, NF
    Correia, MP
    [J]. ARCHITECTING DEPENDABLE SYSTEMS, 2003, 2677 : 3 - 36
  • [2] Intrusion-tolerant intrusion detection system
    Yi, MK
    Hwang, CS
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
  • [3] An approach for availability evaluation of intrusion-tolerant server architectures
    Shi, Tingjun
    Zhao, Jinfeng
    Sang, Xia
    Yin, Xinchun
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 252 - 258
  • [4] Dependability and performance evaluation of intrusion-tolerant server architectures
    Gupta, V
    Lam, V
    Ramasamy, HV
    Sanders, WH
    Singh, S
    [J]. DEPENDABLE COMPUTING, 2003, 2847 : 81 - 101
  • [5] From Analyzing Operating System Vulnerabilities to Designing Multiversion Intrusion-Tolerant Architectures
    Gorbenko, Anatoliy
    Romanovsky, Alexander
    Tarasyuk, Olga
    Biloborodov, Oleksandr
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2020, 69 (01) : 22 - 39
  • [6] An intrusion-tolerant password authentication system
    Wang, XH
    Heydari, MH
    Lin, H
    [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 110 - 118
  • [7] Intrusion-tolerant enclaves
    Dutertre, B
    Crettaz, V
    Stavridou, V
    [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 216 - 224
  • [8] BackupIT: An Intrusion-Tolerant Cooperative Backup System
    Loest, Sergio
    Madruga, Marcelo
    Maziero, Carlos
    Lung, Lau
    [J]. PROCEEDINGS OF THE 8TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, 2009, : 724 - +
  • [9] Probabilistic validation of an intrusion-tolerant replication system
    Singh, S
    Cukier, M
    Sanders, WH
    [J]. 2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 615 - 624
  • [10] Availability analysis and comparison of different intrusion-tolerant systems
    Wang, C
    Ma, JF
    [J]. CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 : 161 - 166