OceanStore: an architecture for global-scale persistent storage
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Intrusion detection using sequences of system calls
Journal of Computer Security
Hi-index | 0.00 |
Despite attacks on computer systems have received a great deal of press attentions, attacks still succeed with painful frequency because that is impossible to guarantee perfect prevention. So intrusion tolerance is required, instead of trying to prevent every single intrusion, these are allowed, but tolerated. Similar to fault tolerance, redundancy is the foundation of intrusion tolerance. Since the security faulty is malicious, diverse redundancy is introduced to obstacle attackers compromising the system. The intrusion tolerance assumes that systems remain certain vulnerabilities and some of attacks on components will be successful; but ensures that the overall system remains secure and operational. One of intrusion-tolerant system architecture is proposed and the constitutions of the system are recommended in brief. The paper disserts emphasis on the realization and issues related to voting mechanism that is used to mask the compromise component. Experiment Results illuminate that voting mechanism is effective to mask some faulty and applies in the condition that does not require response time strictly but demands continuous implementation.