Many information systems that provide useful services to people are connected to the Internet for convenience and efficiency. However, improper accessibility might make the systems susceptible to a variety of attacks. Although existing security solutions such as an intrusion detection system, intrusion prevention system, and firewalls have been designed to protect against such attacks, it is impossible to block all kinds of attacks. Furthermore, most of the proposed solutions require information about attacks for efficient prevention. Research on intrusion-tolerant systems (ITSs) have been conducted in order to continue providing proper services in threatening environments. The purpose of an ITS is to survive against every intrusion, rather than to prevent them. In this paper, previous studies on ITS are introduced and classified according to the centric scheme as middleware-based ITS, hardware-based ITS, and recovery-based ITS. Recent research focusing on adaptive transformation schemes is also introduced.Jungmin Lim received a master degree in electronic engineering and engineering from Seoul National University, Korea, in 2005. He is currently working toward Ph.D. degree in computer science from Korea Advanced Institute of Science and Technology, Korea. His main researches include the system security, especially intrusion tolerant system based on adaptive cluster transformation and historical data.
Dongyoung KooDongyoung Koo received the B.S. degree in computer science from Yonsei University in 2009, and the M.S. degree in computer science from KAIST in 2012. His research interests include information security, secure cloud computing, and cryptography.