Robust intrusion tolerance in information systems

作者: Nong Ye

DOI: 10.1108/09685220110366786

关键词:

摘要: Intrusions exploit vulnerabilities and introduce external disturbances into information systems to compromise security attributes of such as availability, integrity, confidentiality. cause faults software hardware components in systems, which then lead errors failures system performance. Intrusion tolerance requires function correctly a timely manner even under impact intrusions. In this paper, we discuss causes, chain effects barriers intrusions reveal roles that various techniques play intrusion tolerance. We present two robust methods through fault masking: Taguchi’s method for configuration sharing resources via an infrastructure redundancy.

参考文章(29)
Terry Escamilla, Intrusion detection: network security beyond the firewall John Wiley & Sons, Inc.. ,(1998)
J. C. Laprie, J. Arlat, C. Beounes, K. Kanoun, Hardware- and Software-Fault Tolerance Springer, Dordrecht. pp. 786- 789 ,(1990) , 10.1007/978-94-009-0705-8_63
Hoang Pham, Fault-Tolerant Software Systems: Techniques and Applications IEEE Computer Society Press. ,(1992)
Barry W. Johnson, Design & analysis of fault tolerant digital systems Addison-Wesley Longman Publishing Co., Inc.. ,(1988)
Vijay Kumar, Meichun Hsu, Recovery mechanisms in database systems Prentice-Hall, Inc.. ,(1997)
William Cheswick, Firewalls and Internet Security ,(1994)
D. Schnackenberg, K. Djahandari, D. Sterne, Infrastructure for intrusion detection and response darpa information survivability conference and exposition. ,vol. 2, pp. 3- 11 ,(2000) , 10.1109/DISCEX.2000.821505