Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00
DOI: 10.1109/discex.2000.821511
|View full text |Cite
|
Sign up to set email alerts
|

Building survivable systems: an integrated approach based on intrusion detection and damage containment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 32 publications
(18 citation statements)
references
References 21 publications
0
18
0
Order By: Relevance
“…projects (supported by two grants from NSF and two earlier grants from DARPA) [11,3,13,8,9], and the model-checking based vulnerability analysis projects (supported by an NSF ITR award) [7,6] at Stony Brook are all closely aligned with Dan's research background. During his tenure as a CIPIA Fellow, Dan was a key contributor in several research projects.…”
Section: Dsstribution Statement a Approved For Public Release Distribmentioning
confidence: 86%
“…projects (supported by two grants from NSF and two earlier grants from DARPA) [11,3,13,8,9], and the model-checking based vulnerability analysis projects (supported by an NSF ITR award) [7,6] at Stony Brook are all closely aligned with Dan's research background. During his tenure as a CIPIA Fellow, Dan was a key contributor in several research projects.…”
Section: Dsstribution Statement a Approved For Public Release Distribmentioning
confidence: 86%
“…An overview of the research and development of intrusion response system in the last decade is given in [9] 1996 dynamic mapping delayed static cooperative CSM [29] 1996 dynamic mapping delayed/proactive static autonomous EMERALD [18,16] 1997 dynamic mapping delayed static cooperative BMSL-based response [6,26] Table 2: Classification of the surveyed systems.…”
Section: Discussionmentioning
confidence: 99%
“…Other examples of autonomous response system include [23,6,26]. These are host-based systems specifically oriented to handle local intrusion detection and response.…”
Section: Autonomous Vs Cooperativementioning
confidence: 99%
See 1 more Smart Citation
“…To deal with this problem, the Runtime Execution system shown in Figure 1 is equipped with a runtime monitoring mechanism which intercepts model-relevant itinerary events and matches them against models. The idea was proposed in [15,2] and experiments showed less than a 5% overhead to the execution time of most programs. Although their runtime monitoring system operates on system calls, we can adapt it to work on itinerary in our system.…”
Section: Runtime Verification Flowmentioning
confidence: 99%