Proceedings International Conference on Dependable Systems and Networks
DOI: 10.1109/dsn.2002.1028912
|View full text |Cite
|
Sign up to set email alerts
|

The design and implementation of an intrusion tolerant system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(28 citation statements)
references
References 5 publications
0
28
0
Order By: Relevance
“…VirusTotal (VT) is a web service that allows the analysis of a given malware sample by the signature-based engines of different AntiVirus vendors 3 . All the engines are always kept up-to-date with the latest version of the signatures.…”
Section: Experimental Setup and Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…VirusTotal (VT) is a web service that allows the analysis of a given malware sample by the signature-based engines of different AntiVirus vendors 3 . All the engines are always kept up-to-date with the latest version of the signatures.…”
Section: Experimental Setup and Architecturementioning
confidence: 99%
“…In the field of intrusion tolerance there have already been examples of implementing intrusion tolerant architectures which employ diverse intrusion detection systems for detecting malicious behaviour [3]. Similarly, a recent publication [4] has also detailed an implementation of an AntiVirus (AV) platform which makes use of diverse AntiVirus products for malware detection.…”
Section: Introductionmentioning
confidence: 99%
“…Early works on software diversity construct intrusion tolerance systems [3,21] with software providing semantically-close functionalities. This architecture is then utilized for developing diversity-based intrusion detection techniques [6,10,11,16,25].…”
Section: Related Workmentioning
confidence: 99%
“…Interestingly, our architecture could be used to automatically fix any type of software fault, such as invalid memory dereference, by plugging in the appropriate repair module. When it is impossible to automatically obtain a software fix, we can use content-filtering as in [29] to temporarily protect the service. The possibility of combining the two techniques is a topic of future research.…”
Section: Discussionmentioning
confidence: 99%
“…The HACQIT architecture [29] uses various sensors to detect new types of attacks against secure servers, access to which is limited to small numbers of users at a time. Any deviation from expected or known behavior results in the possibly subverted server to be taken off-line.…”
Section: Related Workmentioning
confidence: 99%