Analysis of Techniques For Building Intrusion Tolerant Server Systems

@inproceedings{Wang2003AnalysisOT,
  title={Analysis of Techniques For Building Intrusion Tolerant Server Systems},
  author={Feiyi Wang and Raghavendra Uppalli and Charles Edwin Killian},
  year={2003}
}
The theme of intrusion detection systems (IDS) is detection because prevention mechanism alone is no guarantee to keep intruders out. The research focus of IDS is therefore on how to detect as many attacks as possible, as soon as we can, and at the same time to reduce the false alarm rate. However, a growing recognition is that a variety of mission critical applications need to continue to operate or provide a minimal level of services even when they are under attack or have been partially… CONTINUE READING
Highly Cited
This paper has 25 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 19 extracted citations

An intrusion tolerant system for improving availability in smart grid control centers

2012 18th IEEE International Conference on Networks (ICON) • 2012
View 5 Excerpts
Highly Influenced

An Attack-Tolerant Framework for Web Services

2017 IEEE International Conference on Services Computing (SCC) • 2017
View 1 Excerpt

How Web Services Can Be Tolerant to Intruders through Diversification

2017 IEEE International Conference on Web Services (ICWS) • 2017
View 1 Excerpt

Model-Based Attack Tolerance

2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA) • 2017
View 2 Excerpts

A Comparative Evaluation of Two Intrusion-Tolerant Routing Protocols for Wireless Sensor Networks

2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA) • 2015
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 21 references

An Architecture for an Adaptive Intrusion-Tolerant Server

Security Protocols Workshop • 2002
View 7 Excerpts
Highly Influenced

Intrusion tolerance through forensics-based attack learning

J. E. Just, J. C. Reynolds, K. Levitt
Intrusion Tolerant System Workshop, Supplemental Volume on 2002 International Conference on Dependable System and Networks , pp. C–4–1, 2002. • 2002
View 11 Excerpts
Highly Influenced

Project summary: Randomized failover intrusion tolerant systems.

R. S. Ramanujan
2000
View 5 Excerpts
Highly Influenced

COCA: a secure distributed online certification authority

Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems] • 2002
View 3 Excerpts
Highly Influenced

Quantitative assessment of operational security: Models and tools

M. Dacier, Y. Deswarte, M. Ka âniche
Tech. Rep. 96493, LAAS Rsearch Report, May, 1996. • 1996
View 3 Excerpts
Highly Influenced

Design of a ballot monitor for an intrusion tolerant system

R. Uppalli, R. Wang, F. Wang
inSupplemental Volume of the International Conference on Dependable Systems and Networks (DSN-2002) , pp. B60–B61, 2002. • 2002
View 1 Excerpt

Similar Papers

Loading similar papers…