Real time and dependability concepts
Distributed systems (2nd Ed.)
End-to-end arguments in system design
ACM Transactions on Computer Systems (TOCS)
A guided tour to approximate string matching
ACM Computing Surveys (CSUR)
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
Fault Tolerance: Principles and Practice
Fault Tolerance: Principles and Practice
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Reconfigurable peer-to-peer connectivity overlays for information assurance applications
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
TrustStore: Making Amazon S3 Trustworthy with Services Composition
CCGRID '10 Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing
Integrity for the In-flight web page based on a fragile watermarking chain scheme
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
A self-healing mechanism for an intrusion tolerance system
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
IAAS: an integrity assurance service for web page via a fragile watermarking chain module
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
Towards a secure and available smart grid using intrusion tolerance
IDCS'12 Proceedings of the 5th international conference on Internet and Distributed Computing Systems
Hi-index | 0.00 |
The theme of intrusion detection systems (IDS) is detection because prevention mechanisms alone are not guaranteed to keep intruders out. The research focus of IDS is therefore on how to detect as many attacks as possible, as soon as we can, and at the same time to reduce the false alarm rate. However, a growing recognition is that a variety of mission critical applications need to continue to operate or provide a minimal level of services even when they are under attack or have been partially compromised; hence the need for intrusion tolerance. The goal of this paper is to identify common techniques for building highly available and intrusion tolerant server systems and characterize with examples how various techniques are applied in different application domains. Further, we want to point out the potential pitfalls as well as challenging open research issues which need to be addressed before Intrusion Tolerant Systems (ITS) become prevalent and truly useful beyond a specific range of applications.