A Survey on Intrusion-Tolerant System

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 273
  • Download : 0
Many information systems that provide useful services to people are connected to the Internet for convenience and efficiency. However, improper accessibility might make the systems susceptible to a variety of attacks. Although existing security solutions such as an intrusion detection system, intrusion prevention system, and firewalls have been designed to protect against such attacks, it is impossible to block all kinds of attacks. Furthermore, most of the proposed solutions require information about attacks for efficient prevention. Research on intrusion-tolerant systems (ITSs) have been conducted in order to continue providing proper services in threatening environments. The purpose of an ITS is to survive against every intrusion, rather than to prevent them. In this paper, previous studies on ITS are introduced and classified according to the centric scheme as middleware-based ITS, hardware-based ITS, and recovery-based ITS. Recent research focusing on adaptive transformation schemes is also introduced.
Publisher
Korean Institute of Information Scientists and Engineers
Issue Date
2013-12
Language
English
Citation

Journal of Computing Science and Engineering, v.7, no.4, pp.242 - 250

ISSN
1976-4677
URI
http://hdl.handle.net/10203/187143
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0