2017
DOI: 10.1587/transinf.2015edp7478
|View full text |Cite
|
Sign up to set email alerts
|

Designing and Implementing a Diversity Policy for Intrusion-Tolerant Systems

Abstract: SUMMARYResearch on intrusion-tolerant systems (ITSs) is being conducted to protect critical systems which provide useful information services. To provide services reliably, these critical systems must not have even a single point of failure (SPOF). Therefore, most ITSs employ redundant components to eliminate the SPOF problem and improve system reliability. However, systems that include identical components have common vulnerabilities that can be exploited to attack the servers. Attackers prefer to exploit the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…By letting exposure time of a group of container servers much shorter than that of the other, we are able to reduce the overall exposure time of the entire system. Existing ITS architectures assign all the VM servers uniform exposure time without addressing how they select exposure time [8,11,12,16,27,28]. However, we argue that the overall exposure time can be reduced without using additional resources if we assign each server unidentical exposure time in accordance with the type of clients that the server will handle.…”
Section: Dual Server Clustermentioning
confidence: 99%
See 3 more Smart Citations
“…By letting exposure time of a group of container servers much shorter than that of the other, we are able to reduce the overall exposure time of the entire system. Existing ITS architectures assign all the VM servers uniform exposure time without addressing how they select exposure time [8,11,12,16,27,28]. However, we argue that the overall exposure time can be reduced without using additional resources if we assign each server unidentical exposure time in accordance with the type of clients that the server will handle.…”
Section: Dual Server Clustermentioning
confidence: 99%
“…In other words, a TC in the grace period state cannot be selected: rank = state * ( * nearness + (1 − ) * busyness) . (8) In order to select the most appropriate TC, the algorithm first computes ranking values for each TC, which is presented in (8). There are three variables: state, nearness, and busyness.…”
Section: Network Flow Managementmentioning
confidence: 99%
See 2 more Smart Citations
“…With different working schemes, software diversity can be used to construct the diversified system. A diversified system is an information system consisting of redundant and heterogeneous components, which works according to a voting scheme or dynamic strategy, such as an intrusion tolerant system [6] or an MTD (Moving Target Defense) system [7]. The diversified system is different from the normal static and single-node system because there are redundant functionequivalent components which have made diversity a feature for the whole diversified system.…”
Section: Introductionmentioning
confidence: 99%