Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems]
DOI: 10.1109/fits.2003.1264943
|View full text |Cite
|
Sign up to set email alerts
|

The design and implementation of an intrusion tolerant system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…DREME [11] defends against SQL injection attacks by using redundant database variants and diverse processes. HACQIT [29] uses server diversity (IIS and Apache) to mediate storage accesses from vulnerable web applications and introduces replay attack prevention using blacklists. Finally, Gao et al [23] and STILO [44] use probabilistic anomaly detection over system calls to identify misbehaving variants.…”
Section: Related Workmentioning
confidence: 99%
“…DREME [11] defends against SQL injection attacks by using redundant database variants and diverse processes. HACQIT [29] uses server diversity (IIS and Apache) to mediate storage accesses from vulnerable web applications and introduces replay attack prevention using blacklists. Finally, Gao et al [23] and STILO [44] use probabilistic anomaly detection over system calls to identify misbehaving variants.…”
Section: Related Workmentioning
confidence: 99%
“…We downloaded and saved the rules of Snort for three different default rule configurations available from the Snort webpages (Community rules, Registered rules, and Subscribed rules). The difference between these rules are explained in the Snort website 5 . In summary, the website states the following for these different rules: the Subscribed (paid) rules are the ones that are available to users in real-time as they are released; the Registered rules are available to registered users 30 days after the Subscribed users; the Community rules are a small subset of the subscribed/registered rule sets and are freely available to all users.…”
Section: Description Of the Experiments And The Architecturementioning
confidence: 99%
“…Research projects studied distributed systems using diverse off-the-shelf products for intrusion tolerance (e.g. the U.S. projects Cactus [4], HACQIT [5] and SITAR 6 ; the EU MAFTIA project 7 ), but only sparse research exists on how to choose diverse defenses (some examples in [6], [7] [3,8]).…”
Section: Related Workmentioning
confidence: 99%
“…Vandiver et al [43] use a setting of replicated databases and synchronize at the level of SQL transactions. Reynolds et al [34] diversify a web server using different products running on different operating systems and synchronize at the level of HTTP requests. Rodrigues et al [35] replicate file systems at the level of the NFS protocol.…”
Section: Related Workmentioning
confidence: 99%