Intrusion Tolerant Systems Workshop
نویسندگان
چکیده
A system that can continue critical operations, perhaps in a degraded mode, in the face of a partially successful cyber attack can be termed “intrusion tolerant.” The workshop will provide a forum for the presentation and discussion of current efforts to develop subsystems and systems that display some degree of intrusion tolerance. The workshop will also provide the opportunity for demonstrations of some experimental prototype intrusion tolerant systems. The goal of the workshop is to have a critical and productive discussion of the state of current research and development efforts in the area of intrusion tolerant systems and to identify promising directions for future research in the area.
منابع مشابه
th Workshop on Recent Advances in Intrusion - Tolerant Systems
Design and operational vulnerabilities are accepted as inevitable in today's complex computer systems. The dis tributed and networked nature of the systems that are cur rently in use and being developed facilitate discovery and exploitation of these flaws in increasingly new and easier ways. Intrusion Tolerance acknowledges that it is impos sible to completely prevent attacks and intrusions,...
متن کامل4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010
Design and operational vulnerabilities are accepted as inevitable in today’s complex computer systems. The distributed and networked nature of the systems that are currently in use and being developed facilitate discovery and exploitation of these flaws in increasingly new and easier ways. Intrusion Tolerance acknowledges that it is impossible to completely prevent attacks and intrusions, and t...
متن کاملAn Architecture for an Adaptive Intrusion-Tolerant Server
We describe a general architecture for intrusion-tolerant enterprise systems and the implementation of an intrusion-tolerant Web server as a specific instance. The architecture comprises functionally redundant COTS servers running on diverse operating systems and platforms, hardened intrusion-tolerance proxies that mediate client requests and verify the behavior of servers and other proxies, an...
متن کاملEvaluating Intrusion-Tolerant Certification Authority Systems
Various intrusion-tolerant certification authority (CA) systems have been proposed to provide attack resilient certificate signing (or update) services. However, it is difficult to compare them against each other directly, due to the diversity in system organizations, threshold signature schemes, protocols and usage scenarios. We present a framework for intrusion-tolerant CA system evaluation, ...
متن کاملDeveloping a Heterogeneous Intrusion Tolerant CORBA System
Intrusion Tolerant systems provide high-integrity and high-availability services to their clients in the face of successful attacks from an adversary. The Intrusion Tolerant Distributed Object Systems (ITDOS) research project is developing an architecture for a heterogeneous intrusion tolerant distributed object system. ITDOS integrates a Byzantine Fault Tolerant multicast protocol into an open...
متن کامل