Intrusion-tolerant middleware: The road to automatic security

PE Veríssimo, NF Neves, C Cachin… - IEEE Security & …, 2006 - ieeexplore.ieee.org
The pervasive interconnection of systems throughout the world has given computer services
a significant socioeconomic value that both accidental faults and malicious activity can …

Automated adaptive intrusion containment in systems of interacting services

YS Wu, B Foo, YC Mao, S Bagchi, EH Spafford - Computer networks, 2007 - Elsevier
Large scale distributed systems typically have interactions among different services that
create an avenue for propagation of a failure from one service to another. The failures being …

Bft-to: Intrusion tolerance with less replicas

M Correia, NF Neves, P Verissimo - The Computer Journal, 2013 - academic.oup.com
State machine replication (SMR) is a generic technique for implementing fault-tolerant
distributed services by replicating them in sets of servers. There have been several …

Availability analysis of an intrusion tolerant distributed server system with preventive maintenance

T Uemura, T Dohi, N Kaio - IEEE Transactions on Reliability, 2010 - ieeexplore.ieee.org
We consider availability models of an intrusion tolerant system, and investigate quantitative
effects of preventive maintenance based on security patch releases. The stochastic behavior …

Intrusion detection and attack tolerance for cloud environments: The clarus approach

G Ouffoué, AM Ortiz, AR Cavalli… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
The cloud has become an established and widespread paradigm. This success is due to the
gain of flexibility and savings provided by this technology. However, the main obstacle to full …

[PDF][PDF] Quantitative approach to tuning of a time-based intrusion-tolerant system architecture

Q Nguyen, A Sood - Proc. 3rd Workshop Recent Advances on …, 2009 - researchgate.net
Many institutions rely on open systems to provide services to the public via the Internet.
Unanticipated software vulnerabilities expose such services to malicious actors, and make …

Optimal Security Response to Network Intrusions in IT Systems

K Hammar - arxiv preprint arxiv:2502.02541, 2025 - arxiv.org
Cybersecurity is one of the most pressing technological challenges of our time and requires
measures from all sectors of society. A key measure is automated security response, which …

Quantitative evaluation of intrusion tolerant systems subject to DoS attacks via semi-Markov cost models

T Uemura, T Dohi - Emerging Directions in Embedded and Ubiquitous …, 2007 - Springer
In this paper we quantitatively evaluate the security of intrusion tolerant systems with
preventive maintenance subject to DoS (Denial of Service) attacks. More specifically, we …

Modeling and detecting anomalies in SCADA systems

N Svendsen, S Wolthusen - Critical Infrastructure Protection II 2, 2008 - Springer
The detection of attacks and intrusions based on anomalies is hampered by the limits of
specificity underlying the detection techniques. However, in the case of many critical …

Diagrams for software synthesis

R Jullig, Y Srinivas - Proceedings of 8th Knowledge-Based …, 1993 - ieeexplore.ieee.org
The authors describe the formal environment at Kesteral for synthesizing programs. The
authors show that straightforward formalization, persistently applied at all levels of system …