Implementation of voting mechanism in intrusion tolerance system

  • Authors:
  • Li-Hua Yin;Bin-Xing Fang;Ming-Zeng Hu

  • Affiliations:
  • Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin, China;Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin, China;Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin, China

  • Venue:
  • ICCOMP'05 Proceedings of the 9th WSEAS International Conference on Computers
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Despite attacks on computer systems have received a great deal of press attentions, attacks still succeed with painful frequency because that is impossible to guarantee perfect prevention. So intrusion tolerance is required, instead of trying to prevent every single intrusion, these are allowed, but tolerated. Similar to fault tolerance, redundancy is the foundation of intrusion tolerance. Since the security faulty is malicious, diverse redundancy is introduced to obstacle attackers compromising the system. The intrusion tolerance assumes that systems remain certain vulnerabilities and some of attacks on components will be successful; but ensures that the overall system remains secure and operational. One of intrusion-tolerant system architecture is proposed and the constitutions of the system are recommended in brief. The paper disserts emphasis on the realization and issues related to voting mechanism that is used to mask the compromise component. Experiment Results illuminate that voting mechanism is effective to mask some faulty and applies in the condition that does not require response time strictly but demands continuous implementation.