Intrusion-tolerant middleware: The road to automatic security
The pervasive interconnection of systems throughout the world has given computer services
a significant socioeconomic value that both accidental faults and malicious activity can …
a significant socioeconomic value that both accidental faults and malicious activity can …
Automated adaptive intrusion containment in systems of interacting services
Large scale distributed systems typically have interactions among different services that
create an avenue for propagation of a failure from one service to another. The failures being …
create an avenue for propagation of a failure from one service to another. The failures being …
Bft-to: Intrusion tolerance with less replicas
State machine replication (SMR) is a generic technique for implementing fault-tolerant
distributed services by replicating them in sets of servers. There have been several …
distributed services by replicating them in sets of servers. There have been several …
Availability analysis of an intrusion tolerant distributed server system with preventive maintenance
We consider availability models of an intrusion tolerant system, and investigate quantitative
effects of preventive maintenance based on security patch releases. The stochastic behavior …
effects of preventive maintenance based on security patch releases. The stochastic behavior …
Intrusion detection and attack tolerance for cloud environments: The clarus approach
The cloud has become an established and widespread paradigm. This success is due to the
gain of flexibility and savings provided by this technology. However, the main obstacle to full …
gain of flexibility and savings provided by this technology. However, the main obstacle to full …
[PDF][PDF] Quantitative approach to tuning of a time-based intrusion-tolerant system architecture
Q Nguyen, A Sood - Proc. 3rd Workshop Recent Advances on …, 2009 - researchgate.net
Many institutions rely on open systems to provide services to the public via the Internet.
Unanticipated software vulnerabilities expose such services to malicious actors, and make …
Unanticipated software vulnerabilities expose such services to malicious actors, and make …
Optimal Security Response to Network Intrusions in IT Systems
K Hammar - arxiv preprint arxiv:2502.02541, 2025 - arxiv.org
Cybersecurity is one of the most pressing technological challenges of our time and requires
measures from all sectors of society. A key measure is automated security response, which …
measures from all sectors of society. A key measure is automated security response, which …
Quantitative evaluation of intrusion tolerant systems subject to DoS attacks via semi-Markov cost models
T Uemura, T Dohi - Emerging Directions in Embedded and Ubiquitous …, 2007 - Springer
In this paper we quantitatively evaluate the security of intrusion tolerant systems with
preventive maintenance subject to DoS (Denial of Service) attacks. More specifically, we …
preventive maintenance subject to DoS (Denial of Service) attacks. More specifically, we …
Modeling and detecting anomalies in SCADA systems
N Svendsen, S Wolthusen - Critical Infrastructure Protection II 2, 2008 - Springer
The detection of attacks and intrusions based on anomalies is hampered by the limits of
specificity underlying the detection techniques. However, in the case of many critical …
specificity underlying the detection techniques. However, in the case of many critical …
Diagrams for software synthesis
R Jullig, Y Srinivas - Proceedings of 8th Knowledge-Based …, 1993 - ieeexplore.ieee.org
The authors describe the formal environment at Kesteral for synthesizing programs. The
authors show that straightforward formalization, persistently applied at all levels of system …
authors show that straightforward formalization, persistently applied at all levels of system …