2006
DOI: 10.1002/spe.747
|View full text |Cite
|
Sign up to set email alerts
|

An architecture for adaptive intrusion‐tolerant applications

Abstract: Applications that are part of a mission‐critical information system need to maintain a usable level of key services through ongoing cyber‐attacks. In addition to the well‐publicized denial of service (DoS) attacks, these networked and distributed applications are increasingly threatened by sophisticated attacks that attempt to corrupt system components and violate service integrity. While various approaches have been explored to deal with DoS attacks, corruption‐inducing attacks remain largely unaddressed. We … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…The managed execution environment also offers multiple modes of mounting such adaptations-proactively as a pre-emptive action, or reactively as a response to observed events. Complementing our prior work in dynamic adaptation for defense involving port hopping [1] or unpredictable replica re-placement [2], the A3 managed execution environment introduces new opportunities to make the protected application a moving target over a larger part of the lifecycle of the deployed application. An attacker's foothold or accumulated privilege in a given container can be alleviated by redirecting the mediated I/O to another container started with a check pointed state.…”
Section: Introductionmentioning
confidence: 99%
“…The managed execution environment also offers multiple modes of mounting such adaptations-proactively as a pre-emptive action, or reactively as a response to observed events. Complementing our prior work in dynamic adaptation for defense involving port hopping [1] or unpredictable replica re-placement [2], the A3 managed execution environment introduces new opportunities to make the protected application a moving target over a larger part of the lifecycle of the deployed application. An attacker's foothold or accumulated privilege in a given container can be alleviated by redirecting the mediated I/O to another container started with a check pointed state.…”
Section: Introductionmentioning
confidence: 99%
“…ITSs are concerned more with the effects of attacks on the target system than the causes of the attacks because they mainly support the availabilities and do not detect or prevent attacks. ITS architectures are classified into four categories [1]: detection triggered [2]- [4], algorithm driven [5], [6], recovery based [7]- [20], and hybrid [21]. This study focuses on recovery-based methods because the other types of ITSs employ intrusion detection methods and the aim was to build ITSs to cope with situations where the intrusion cannot be detected.…”
Section: Introductionmentioning
confidence: 99%
“…agility techniques (King 2011), and called for assessment methodologies to be developed. Raytheon has been working in the area of cyber resilient architectures since the DARPA Intrusion Tolerance by Unpredictability and Adaptation (ITUA) program described in (Pal 2006). MITRE documented general processes and recommendations for improving cyber resilience of architectures in (Bodeau 2013).…”
mentioning
confidence: 99%