Survivability analysis of networked systems
ICSE '01 Proceedings of the 23rd International Conference on Software Engineering
Probability and statistics with reliability, queuing and computer science applications
Probability and statistics with reliability, queuing and computer science applications
Survivability Analysis of Network Specifications
DSN '00 Proceedings of the 2000 International Conference on Dependable Systems and Networks (formerly FTCS-30 and DCCA-8)
Addressing Network Survivability Issues by Finding the K-best Paths through a Trellis Graph
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Software Rejuvenation: Analysis, Module and Applications
FTCS '95 Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
Transient time analysis of network security survivability using DEVS
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
A survey of software aging and rejuvenation studies
ACM Journal on Emerging Technologies in Computing Systems (JETC) - Special Issue on Reliability and Device Degradation in Emerging Technologies and Special Issue on WoSAR 2011
Hi-index | 0.00 |
Current intrusion detection mechanisms have quite low detection and high false alarm rates. Thus we propose a model of intrusion tolerant system (ITS) to increase the survivability level from the successful attacks. In this paper, we present the cluster recovery model using cold standby cluster with a software rejuvenation methodology, which is applicable in security field and also less expensive. Firstly, we perform the steady state analysis of a cluster system and then consider an ITS with cold standby cluster. The basic idea is – investigate the consequences for the exact responses in face of attacks and rejuvenate the running service or/and reconfigure it. It shows that the system operates through intrusions and provides continued the critical functions, and gracefully degrades non-critical system functionality in the face of intrusions.