Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems]
DOI: 10.1109/fits.2003.1264925
|View full text |Cite
|
Sign up to set email alerts
|

The design of an adaptive intrusion tolerant database system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(17 citation statements)
references
References 8 publications
0
17
0
Order By: Relevance
“…However, we would like to point out that CoBFIT is a more general framework that can potentially facilitate the creation of other kinds of intrusion-tolerant systems. For example, the CoBFIT framework components can also facilitate the building of an intrusion-tolerant database system, such as the one mentioned in [15].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, we would like to point out that CoBFIT is a more general framework that can potentially facilitate the creation of other kinds of intrusion-tolerant systems. For example, the CoBFIT framework components can also facilitate the building of an intrusion-tolerant database system, such as the one mentioned in [15].…”
Section: Related Workmentioning
confidence: 99%
“…Reconfigurability is one of the design principles of CoBFIT that resulted from the realization that different intrusion-tolerant systems require different sets of protocols that may have to be reconfigured (without requiring modification, recompilation, or re-linking of the program itself, or shutting down and restarting of the CoBFIT system) when responding to attacks. It is a key capability that is required by intrusiontolerant systems that adapt to attacks by changing the security posture and switching to increased levels of alertness (e.g., AITDB [15], ITUA [3]). …”
Section: Framework Componentsmentioning
confidence: 99%
“…The adaptations are triggered under three possible situations: (a) when the Emergency Analyzer reports an emergency to the SSM, (b) when the SSM pulls some situation data from the components, and (c) when the components push some situation data to the SSM. Readers can refer to [LL02] for more details about this subsystem.…”
Section: Figure 11 -Organization Of the Self-stabilization Subsystem mentioning
confidence: 99%
“…As explained in the previous section, neither attack isolation nor multiphase damage containment techniques presents a method to determine anomaly threshold adaptively based on the change of environmental conditions, which controls false alarm. Luenam et al presented an adaptive controller to solve this problem [14]. This adaptive controller aims to improve the adaptation of an ITDB system so that the trustworthiness-to-cost range settles at an appropriate level.…”
Section: The False Alarm Controllermentioning
confidence: 99%
“…These attacks are usually done through web applications which have vast accessibility [1,2,25]. For confronting with such attacks, we need mechanisms like intrusion tolerant database systems [3,4,5].…”
Section: Introductionmentioning
confidence: 99%