2011
DOI: 10.1109/msp.2010.145
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison of Intrusion-Tolerant System Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(18 citation statements)
references
References 10 publications
0
18
0
Order By: Relevance
“…Similarly, to balance the nodes' energy consumption and avoid the situation where there are some higher energy level nodes still in a dead network, the selection of a lower energy level node should have a higher cost than selecting a higher energy level node. Thus, we define the cost matrices for the simulation as follows: C1 = [5.5, 7.5, 11, 25, 31, 37, 43, 52, 63], C2 = [6,8,11,23,30,35,42,50,62], C3 = [6.5, 8.5, 12, 21, 28, 33, 40, 48, 60], C4 = [8,10,13,18,25,30,37,45,55], C5 = [8.5, 11, 15, 19, 27, 32, 38, 47, 58], C6 = [9,10,15,20,28,32,38,48,59], C7 = [9,12,16,15,20,28,33,40,50], C8 = [10,13,18,16,21,28,34,42,51], and C9 = [11,…”
Section: Simulation Experiments and Resultsmentioning
confidence: 99%
“…Similarly, to balance the nodes' energy consumption and avoid the situation where there are some higher energy level nodes still in a dead network, the selection of a lower energy level node should have a higher cost than selecting a higher energy level node. Thus, we define the cost matrices for the simulation as follows: C1 = [5.5, 7.5, 11, 25, 31, 37, 43, 52, 63], C2 = [6,8,11,23,30,35,42,50,62], C3 = [6.5, 8.5, 12, 21, 28, 33, 40, 48, 60], C4 = [8,10,13,18,25,30,37,45,55], C5 = [8.5, 11, 15, 19, 27, 32, 38, 47, 58], C6 = [9,10,15,20,28,32,38,48,59], C7 = [9,12,16,15,20,28,33,40,50], C8 = [10,13,18,16,21,28,34,42,51], and C9 = [11,…”
Section: Simulation Experiments and Resultsmentioning
confidence: 99%
“…Besides, [Nguyen and Sood, 2010], ] and [La, 2016] classify ITS (Intrusion Tolerant Systems) architectures into four categories :…”
Section: Attack Tolerance Techniquesmentioning
confidence: 99%
“…In response to this problem, researchers have proposed network intrusion tolerant system (ITS), which proactively defends victim systems without detecting nor blocking intrusion attempts [4,5]. Of the various types of ITS proposed until today, recovery-based ITS, which periodically reverts the production services to their clean initial states, is now widely endorsed and deployed [3,6,7].…”
Section: Introductionmentioning
confidence: 99%