Intrusion-tolerant middleware: The road to automatic security

PE Veríssimo, NF Neves, C Cachin… - IEEE Security & …, 2006 - ieeexplore.ieee.org
The pervasive interconnection of systems throughout the world has given computer services
a significant socioeconomic value that both accidental faults and malicious activity can …

Automated adaptive intrusion containment in systems of interacting services

YS Wu, B Foo, YC Mao, S Bagchi, EH Spafford - Computer networks, 2007 - Elsevier
Large scale distributed systems typically have interactions among different services that
create an avenue for propagation of a failure from one service to another. The failures being …

Bft-to: Intrusion tolerance with less replicas

M Correia, NF Neves, P Verissimo - The Computer Journal, 2013 - academic.oup.com
State machine replication (SMR) is a generic technique for implementing fault-tolerant
distributed services by replicating them in sets of servers. There have been several …

Availability analysis of an intrusion tolerant distributed server system with preventive maintenance

T Uemura, T Dohi, N Kaio - IEEE Transactions on Reliability, 2010 - ieeexplore.ieee.org
We consider availability models of an intrusion tolerant system, and investigate quantitative
effects of preventive maintenance based on security patch releases. The stochastic behavior …

Intrusion detection and attack tolerance for cloud environments: The clarus approach

G Ouffoué, AM Ortiz, AR Cavalli… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
The cloud has become an established and widespread paradigm. This success is due to the
gain of flexibility and savings provided by this technology. However, the main obstacle to full …

[PDF][PDF] Quantitative approach to tuning of a time-based intrusion-tolerant system architecture

Q Nguyen, A Sood - Proc. 3rd Workshop Recent Advances on …, 2009 - researchgate.net
Many institutions rely on open systems to provide services to the public via the Internet.
Unanticipated software vulnerabilities expose such services to malicious actors, and make …

Quantitative evaluation of intrusion tolerant systems subject to DoS attacks via semi-Markov cost models

T Uemura, T Dohi - Emerging Directions in Embedded and Ubiquitous …, 2007 - Springer
In this paper we quantitatively evaluate the security of intrusion tolerant systems with
preventive maintenance subject to DoS (Denial of Service) attacks. More specifically, we …

Modeling and detecting anomalies in SCADA systems

N Svendsen, S Wolthusen - Critical Infrastructure Protection II 2, 2008 - Springer
The detection of attacks and intrusions based on anomalies is hampered by the limits of
specificity underlying the detection techniques. However, in the case of many critical …

Diagrams for software synthesis

R Jullig, Y Srinivas - Proceedings of 8th Knowledge-Based …, 1993 - ieeexplore.ieee.org
The authors describe the formal environment at Kesteral for synthesizing programs. The
authors show that straightforward formalization, persistently applied at all levels of system …

网络空间拟态防御发展综述: 从拟态概念到“拟态+” 生态

马海龙, 王亮, 胡涛, 江逸茗, 曲彦泽 - 网络与信息安全学报, 2022 - infocomm-journal.com
网络空间拟态防御(CMD, cyberspace mimic defense) 基于动态异构冗余架构实现多体执行,
多模裁决和多维重构, 以不确定性系统应对网络空间泛在化的不确定性威胁. 从纵向, 横向, 当前 …