2004
DOI: 10.1109/mic.2004.54
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive cyberdefense for survival and intrusion tolerance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2006
2006
2022
2022

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 32 publications
(14 citation statements)
references
References 7 publications
0
14
0
Order By: Relevance
“…The ultimate goal of this work is to reduce the number of alarms to be notified to users. Atighetchi et al [7] target intrusion tolerance through strategies such as replicating key application components, attack containment and unpredictable change of configurations. Weise [8] listed several goals for adaptive security, including reducing remediation time, decreasing attack velocity and shrinking the attack surface.…”
Section: Related Workmentioning
confidence: 99%
“…The ultimate goal of this work is to reduce the number of alarms to be notified to users. Atighetchi et al [7] target intrusion tolerance through strategies such as replicating key application components, attack containment and unpredictable change of configurations. Weise [8] listed several goals for adaptive security, including reducing remediation time, decreasing attack velocity and shrinking the attack surface.…”
Section: Related Workmentioning
confidence: 99%
“…VI. RELATED WORK The concept of intrusion tolerance has been explored in [9,10,11,12,13]. Our assumption that undetected intrusions are inevitable and must be treated as an inherent problem of clusters is similar to that of Recovery Oriented Computing, which considers software and human errors as the norm and handles them by isolation and redundancy [14].…”
Section: Performance Studiesmentioning
confidence: 99%
“…In particular, intrusion tolerance has been a good approach to achieve the practical goal of cyber-defense that has to provide services even if crucial parts of the systems are taken by attackers [3].…”
Section: Introductionmentioning
confidence: 99%