Intrusion Tolerant Systems Workshop

نویسندگان

  • Carl E. Landwehr
  • Steven M. Bellovin
چکیده

A system that can continue critical operations, perhaps in a degraded mode, in the face of a partially successful cyber attack can be termed “intrusion tolerant.” The workshop will provide a forum for the presentation and discussion of current efforts to develop subsystems and systems that display some degree of intrusion tolerance. The workshop will also provide the opportunity for demonstrations of some experimental prototype intrusion tolerant systems. The goal of the workshop is to have a critical and productive discussion of the state of current research and development efforts in the area of intrusion tolerant systems and to identify promising directions for future research in the area.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

th Workshop on Recent Advances in Intrusion - Tolerant Systems

Design and operational vulnerabilities are accepted as inevitable in today's complex computer systems. The dis­ tributed and networked nature of the systems that are cur­ rently in use and being developed facilitate discovery and exploitation of these flaws in increasingly new and easier ways. Intrusion Tolerance acknowledges that it is impos­ sible to completely prevent attacks and intrusions,...

متن کامل

4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010

Design and operational vulnerabilities are accepted as inevitable in today’s complex computer systems. The distributed and networked nature of the systems that are currently in use and being developed facilitate discovery and exploitation of these flaws in increasingly new and easier ways. Intrusion Tolerance acknowledges that it is impossible to completely prevent attacks and intrusions, and t...

متن کامل

An Architecture for an Adaptive Intrusion-Tolerant Server

We describe a general architecture for intrusion-tolerant enterprise systems and the implementation of an intrusion-tolerant Web server as a specific instance. The architecture comprises functionally redundant COTS servers running on diverse operating systems and platforms, hardened intrusion-tolerance proxies that mediate client requests and verify the behavior of servers and other proxies, an...

متن کامل

Evaluating Intrusion-Tolerant Certification Authority Systems

Various intrusion-tolerant certification authority (CA) systems have been proposed to provide attack resilient certificate signing (or update) services. However, it is difficult to compare them against each other directly, due to the diversity in system organizations, threshold signature schemes, protocols and usage scenarios. We present a framework for intrusion-tolerant CA system evaluation, ...

متن کامل

Developing a Heterogeneous Intrusion Tolerant CORBA System

Intrusion Tolerant systems provide high-integrity and high-availability services to their clients in the face of successful attacks from an adversary. The Intrusion Tolerant Distributed Object Systems (ITDOS) research project is developing an architecture for a heterogeneous intrusion tolerant distributed object system. ITDOS integrates a Byzantine Fault Tolerant multicast protocol into an open...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002