Architectures for intrusion tolerant database systems

P Liu - 18th Annual Computer Security Applications …, 2002 - ieeexplore.ieee.org
In this paper we propose four architectures for intrusion-tolerant database systems. While
traditional secure database systems rely on prevention controls, an intrusion-tolerant …

[PS][PS] Intrusion response systems: a survey

B Foo, MW Glause, GM Howard, YS Wu… - … and security in …, 2008 - cerias.purdue.edu
Protecting networks from computer security attacks is an important concern of computer
security. Within this, intrusion prevention and intrusion detection systems have been the …

Security analysis of SITAR intrusion tolerance system

D Wang, BB Madan, KS Trivedi - … of the 2003 ACM workshop on …, 2003 - dl.acm.org
Security is an important QoS attribute for characterizing intrusion tolerant computing
systems. Frequently however, the security of computing systems is assessed in a qualitative …

Automated adaptive intrusion containment in systems of interacting services

YS Wu, B Foo, YC Mao, S Bagchi, EH Spafford - Computer networks, 2007 - Elsevier
Large scale distributed systems typically have interactions among different services that
create an avenue for propagation of a failure from one service to another. The failures being …

Improving the security of microservice systems by detecting and tolerating intrusions

J Flora - 2020 IEEE International Symposium on Software …, 2020 - ieeexplore.ieee.org
Microservice architectures adoption is growing expeditiously in market size and adoption,
including in business-critical systems. This is due to agility in development and deployment …

The design and implementation of a self-healing database system

P Liu, J **g, P Luenam, Y Wang, L Li… - Journal of Intelligent …, 2004 - Springer
In this paper, we present the design and implementation of ITDB, a self-healing or intrusion-
tolerant database prototype system. While traditional secure database systems rely on …

[LIBRO][B] Information assurance: dependability and security in networked systems

Y Qian, D Tipper, P Krishnamurthy, J Joshi - 2010 - books.google.com
In today's fast paced, infocentric environment, professionals increasingly rely on networked
information technology to do business. Unfortunately, with the advent of such technology …

Intrusion tolerant approach for denial of service attacks to web services

M Ficco, M Rak - 2011 First International Conference on Data …, 2011 - ieeexplore.ieee.org
Intrusion Detection Systems are the major technology used for protecting information
systems. However, they do not directly detect intrusion, but they only monitor the attack …

[LIBRO][B] Network security: know it all

J Joshi - 2008 - books.google.com
Network Security: Know It All explains the basics, describes the protocols, and discusses
advanced topics, by the best and brightest experts in the field of network security …

Modeling and evaluating the survivability of an intrusion tolerant database system

H Wang, P Liu - Computer Security–ESORICS 2006: 11th European …, 2006 - Springer
The immaturity of current intrusion detection techniques limits the traditional security systems
in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome …