2013
DOI: 10.5626/jcse.2013.7.4.242
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Intrusion-Tolerant System

Abstract: Many information systems that provide useful services to people are connected to the Internet for convenience and efficiency. However, improper accessibility might make the systems susceptible to a variety of attacks. Although existing security solutions such as an intrusion detection system, intrusion prevention system, and firewalls have been designed to protect against such attacks, it is impossible to block all kinds of attacks. Furthermore, most of the proposed solutions require information about attacks … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…The goal of ITS is to provide reliability and survivability by maintaining quality of service even while under attack [3]. When designing an ITS, the fundamental principles are redundancy, diversity, and recovery [4,5]. Redundancy refers to the duplication of elements or services in a system.…”
Section: Introductionmentioning
confidence: 99%
“…The goal of ITS is to provide reliability and survivability by maintaining quality of service even while under attack [3]. When designing an ITS, the fundamental principles are redundancy, diversity, and recovery [4,5]. Redundancy refers to the duplication of elements or services in a system.…”
Section: Introductionmentioning
confidence: 99%
“…To achieve the goal of ITS, in general, redundancy and diversity are the two fundamental principles in designing ITS [6] [7]. Redundancy refers to the duplication of elements or services in a system.…”
Section: Fig 2: the Concept Of Intrusion Tolerance System (Its)mentioning
confidence: 99%
“…In the past few years, several intrusion tolerant cyber-system architectures have been proposed. A survey of these architectures is available in Heo et al 74 and three of these architectures, namely SITAR, 75 , MAFTIA 76 and SCIT, 77 have been compared by Nguyen and Sood. 78 A quantitative security model developed by Madan et al 79 has shown that the security performance in terms of the probability of arriving into security failed states and Mean-Time-To-Security-Failure (MTTSF) to reach these states is improved in intrusion tolerant architectures.…”
Section: Defending Against Cyber Threats To Unmanned Autonomous Systemsmentioning
confidence: 99%