2006 IEEE International Performance Computing and Communications Conference
DOI: 10.1109/.2006.1629444
|View full text |Cite
|
Sign up to set email alerts
|

Incorruptible System Self-Cleansing for Intrusion Tolerance

Abstract:  Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolution of attack techniques. The trend lends importance to the concept of intrusion tolerance: a critical system must fend off or at least limit the damage caused by unknown and/or undetected attacks. In prior work, we developed a Self-Cleansing Intrusion Tolerance (SCIT) architecture that achieves the above goal by constantly cleansing … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 1 publication
0
12
0
Order By: Relevance
“…A central controller is used to manage server rotations and role assignments [11]. (In implementations, the controller could also be an offthe-shelf server; the name suggests its use not its construction.)…”
Section: Scit/hes Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…A central controller is used to manage server rotations and role assignments [11]. (In implementations, the controller could also be an offthe-shelf server; the name suggests its use not its construction.)…”
Section: Scit/hes Overviewmentioning
confidence: 99%
“…In [11], we presented SCIT/HES (HES for Hardware Enhanced Security), which uses simple hardware enhancements to provide incorruptibility guarantees, or SCIT Primitives.…”
Section: Introductionmentioning
confidence: 99%
“…The service in SCIT system is related with the high-availability such as the seamless server transitions and sharing of server identities (IP and/or hardware addresses). Examples of existing high-availability systems include DNS servers, NFS servers, web services, authentication services, firewalls, IPsec gateways, and virtual private network (VPN) gateways [23].…”
Section: Introductionmentioning
confidence: 99%
“…The most similar intrusion tolerance solution to RWS is SCIT [10]; they both use virtualization, replicated VS images, reversions, and rotations. There are, however, critical distinctions.…”
Section: Related Workmentioning
confidence: 99%