DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jang, Bum Soon | ko |
dc.contributor.author | Doo, Seokjoo | ko |
dc.contributor.author | Lee, Soojin | ko |
dc.contributor.author | Yoon, Hyunsoo | ko |
dc.date.accessioned | 2016-07-06T04:24:53Z | - |
dc.date.available | 2016-07-06T04:24:53Z | - |
dc.date.created | 2016-06-08 | - |
dc.date.created | 2016-06-08 | - |
dc.date.issued | 2016-04 | - |
dc.identifier.citation | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E99D, no.4, pp.1081 - 1091 | - |
dc.identifier.issn | 1745-1361 | - |
dc.identifier.uri | http://hdl.handle.net/10203/209544 | - |
dc.description.abstract | Due to the periodic recovery of virtual machines regardless of whether malicious intrusions exist, proactive recovery-based Intrusion Tolerant Systems (ITSs) are being considered for mission-critical applications. However, the virtual replicas can easily be exposed to attacks during their working period, and additionally, proactive recovery based ITSs are ineffective in eliminating the vulnerability of exposure time, which is closely related to service availability. To address these problems, we propose a novel hybrid recovery-based ITS in this paper. The proposed method utilizes availability-driven recovery and dynamic cluster resizing. The availability-driven recovery method operates the recovery process by both proactive and reactive ways for the system to gain shorter exposure times and higher success rates. The dynamic cluster resizing method reduces the overhead of the system that occurs from dynamic workload fluctuations. The performance of the proposed ITS with various synthetic and real workloads using CloudSim showed that it guarantees higher availability and reliability of the system, even under malicious intrusions such as DDoS attacks | - |
dc.language | English | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.subject | PROACTIVE RECOVERY | - |
dc.subject | REPLICAS | - |
dc.title | Hybrid Recovery-Based Intrusion Tolerant System for Practical Cyber-Defense | - |
dc.type | Article | - |
dc.identifier.wosid | 000375973800034 | - |
dc.identifier.scopusid | 2-s2.0-84962783988 | - |
dc.type.rims | ART | - |
dc.citation.volume | E99D | - |
dc.citation.issue | 4 | - |
dc.citation.beginningpage | 1081 | - |
dc.citation.endingpage | 1091 | - |
dc.citation.publicationname | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.identifier.doi | 10.1587/transinf.2015CYP0006 | - |
dc.contributor.localauthor | Yoon, Hyunsoo | - |
dc.contributor.nonIdAuthor | Doo, Seokjoo | - |
dc.contributor.nonIdAuthor | Lee, Soojin | - |
dc.type.journalArticle | Article; Proceedings Paper | - |
dc.subject.keywordAuthor | intrusion tolerant system (ITS) | - |
dc.subject.keywordAuthor | hybrid recovery | - |
dc.subject.keywordAuthor | availability-driven recovery | - |
dc.subject.keywordAuthor | dynamic cluster resizing | - |
dc.subject.keywordAuthor | mission-critical application | - |
dc.subject.keywordPlus | PROACTIVE RECOVERY | - |
dc.subject.keywordPlus | REPLICAS | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.