2014
DOI: 10.1587/transinf.e97.d.984
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Intrusion Tolerant System Using Live Migration

Abstract: SUMMARYThis letter proposes a novel intrusion tolerant system consisting of several virtual machines (VMs) that refresh the target system periodically and by live migration, which monitors the many features of the VMs to identify and replace exhausted VMs. The proposed scheme provides adequate performance and dependability against denial of service (DoS) attacks. To show its efficiency and security, we conduct experiments on the CSIM20 simulator, which showed 22% improvement in a normal situation and approxima… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…Recent studies [20], [23], [27] found that proactive recovery had an inherent limitation by periodical recovery. Even if proactive recovery can eliminate some unknown attacks like zero-day attacks periodically [28], stealth resource exhaustion attacks like an application-layer DDoS directly causes the performance degradation, and they cannot be tolerated easily by existing proactive recovery or reactive recovery which use the signature based intrusion detection.…”
Section: Reactive Recovery With Cpu Utilizationmentioning
confidence: 99%
“…Recent studies [20], [23], [27] found that proactive recovery had an inherent limitation by periodical recovery. Even if proactive recovery can eliminate some unknown attacks like zero-day attacks periodically [28], stealth resource exhaustion attacks like an application-layer DDoS directly causes the performance degradation, and they cannot be tolerated easily by existing proactive recovery or reactive recovery which use the signature based intrusion detection.…”
Section: Reactive Recovery With Cpu Utilizationmentioning
confidence: 99%