Design of a Secure System Considering Quality of Service

Cited 4 time in webofscience Cited 4 time in scopus
  • Hit : 418
  • Download : 562
Improvements in networking technologies have provided users with useful information services. Such information services may bring convenience and efficiency, but might be accompanied by vulnerabilities to a variety of attacks. Therefore, a variety of research to enhance the security of the systems and get the services at the same time has been carried out. Especially, research on intrusion-tolerant systems (ITSs) has been conducted in order to survive against every intrusion, rather than to detect and prevent them. In this paper, an ITS based on effective resource conversion (ERC) is presented to achieve the goal of intrusion-tolerance. Instead of using the fixed number of virtual machines (VMs) to process requests and recover as in conventional approaches, the ITS based on ERC can transform the assigned resources depending on the system status. This scheme is proved to maintain a certain level of quality of service (QoS) and quality of security service (QoSS) in threatening environments. The performance of ERC is compared with previous studies on ITS by CSIM 20, and it is verified that the proposed scheme is more effective in retaining a specific level of QoS and QoSS.
Publisher
MDPI AG
Issue Date
2014-12
Language
English
Article Type
Article
Citation

SYMMETRY-BASEL, v.6, no.4, pp.938 - 953

ISSN
2073-8994
DOI
10.3390/sym6040938
URI
http://hdl.handle.net/10203/201045
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
000346795100007.pdf(778.85 kB)Download
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 4 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0