Intrusion-tolerant middleware: The road to automatic security
The pervasive interconnection of systems throughout the world has given computer services
a significant socioeconomic value that both accidental faults and malicious activity can …
a significant socioeconomic value that both accidental faults and malicious activity can …
[PDF][PDF] Intrusion-resilient middleware design and validation
Intrusion Tolerance has become a reference paradigm for dealing with intrusions and
accidental faults, achieving security and dependability in an automatic way, much along the …
accidental faults, achieving security and dependability in an automatic way, much along the …
Adaptive cyberdefense for survival and intrusion tolerance
M Atighetchi, P Pal, F Webber, R Schantz… - IEEE Internet …, 2004 - ieeexplore.ieee.org
While providing some resistance against cyberattacks, current approaches to securing
networked and distributed information systems are mainly concerned with static prevention …
networked and distributed information systems are mainly concerned with static prevention …
A comparison of intrusion-tolerant system architectures
Q Nguyen, A Sood - IEEE Security & Privacy, 2010 - ieeexplore.ieee.org
Comparative Analysis of Intrusion-Tolerant System Architectures Page 1 1 Comparative
Analysis of Intrusion-Tolerant System Architectures Quyen L. Nguyen1 and Arun Sood1,2 …
Analysis of Intrusion-Tolerant System Architectures Quyen L. Nguyen1 and Arun Sood1,2 …
An architecture for adaptive intrusion‐tolerant applications
P Pal, P Rubel, M Atighetchi, F Webber… - Software: Practice …, 2006 - Wiley Online Library
Applications that are part of a mission‐critical information system need to maintain a usable
level of key services through ongoing cyber‐attacks. In addition to the well‐publicized denial …
level of key services through ongoing cyber‐attacks. In addition to the well‐publicized denial …
A qualitative analysis of the intrusion-tolerance capabilities of the MAFTIA architecture
R Stroud, I Welch, J Warne… - … on Dependable Systems …, 2004 - ieeexplore.ieee.org
MAFTIA was a three-year European research project that explored the use of fault-tolerance
techniques to build intrusion-tolerant systems. The MAFTIA architecture embodies a number …
techniques to build intrusion-tolerant systems. The MAFTIA architecture embodies a number …
Analysis of techniques for building intrusion tolerant server systems
The theme of intrusion detection systems (IDS) is detection because prevention mechanisms
alone are not guaranteed to keep intruders out. The research focus of IDS is therefore on …
alone are not guaranteed to keep intruders out. The research focus of IDS is therefore on …
Intrusion-tolerant architectures: Concepts and design
There is a significant body of research on distributed computing architectures,
methodologies and algorithms, both in the fields of fault tolerance and security. Whilst they …
methodologies and algorithms, both in the fields of fault tolerance and security. Whilst they …
Intrusion tolerant software architectures
V Stavridou, B Dutertre… - … and Exposition II …, 2001 - ieeexplore.ieee.org
The complexity of the software systems built today virtually guarantees the existence of
security vulnerabilities. When the existence of specific vulnerabilities becomes known …
security vulnerabilities. When the existence of specific vulnerabilities becomes known …
[PDF][PDF] An adaptive intrusion-tolerant server architecture
We describe a general architecture for intrusion-tolerant enterprise systems and the
implementation of an intrusion-tolerant Web server as a specific instance. The architecture …
implementation of an intrusion-tolerant Web server as a specific instance. The architecture …