2020
DOI: 10.1504/ijsn.2020.10031997
|View full text |Cite
|
Sign up to set email alerts
|

A game theoretic approach based on intrusion tolerant systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
0
0
Order By: Relevance
“…However, simply using these mechanisms cannot avoid compromising vulnerable controllers due to their visible nature. In the paper [12], the authors propose to approach the issue of intrusion tolerance in the SDN control plane by first applying a Recovery Based model which assumes that as soon as a system comes online it is compromised; therefore, periodic restoration to a good state is necessary. Secondly, they establish Moving Target Defense (MTD) that provides a proactive defense against adaptive adversaries.…”
Section: Itc: Intrusion Tolerant Controller For Multicontroller Sdn A...mentioning
confidence: 99%
See 1 more Smart Citation
“…However, simply using these mechanisms cannot avoid compromising vulnerable controllers due to their visible nature. In the paper [12], the authors propose to approach the issue of intrusion tolerance in the SDN control plane by first applying a Recovery Based model which assumes that as soon as a system comes online it is compromised; therefore, periodic restoration to a good state is necessary. Secondly, they establish Moving Target Defense (MTD) that provides a proactive defense against adaptive adversaries.…”
Section: Itc: Intrusion Tolerant Controller For Multicontroller Sdn A...mentioning
confidence: 99%
“…MAFTIA [5] SCIT [6] ACT [7] Hybrid Recovery-Based ITS [8] Framework for IT [9] IT Through Flow Monitoring [10] Fault-Tolerant and Consistent SDN Controller [11] ITC [12] In this paper, we have presented an analysis of several Intrusion Tolerant Systems in Cloud Computing and SDN. In sum, we have described each architecture, its characteristics, and its techniques used to tolerate intrusions, and have made a brief analysis compared to the different approaches proposed in [3]: Detection-Triggered, Algorithm-Driven, and Recovery Based, in a try to classify each approach.…”
mentioning
confidence: 99%