摘要: Intrusions exploit vulnerabilities and introduce external disturbances into information systems to compromise security attributes of such as availability, integrity, confidentiality. cause faults software hardware components in systems, which then lead errors failures system performance. Intrusion tolerance requires function correctly a timely manner even under impact intrusions. In this paper, we discuss causes, chain effects barriers intrusions reveal roles that various techniques play intrusion tolerance. We present two robust methods through fault masking: Taguchi’s method for configuration sharing resources via an infrastructure redundancy.