2003
DOI: 10.1007/978-3-540-45214-0_9
|View full text |Cite
|
Sign up to set email alerts
|

Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0
3

Year Published

2004
2004
2018
2018

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(21 citation statements)
references
References 5 publications
0
17
0
3
Order By: Relevance
“…Research projects studied distributed systems using diverse products for intrusion tolerance (e.g. Cactus [9], HACQIT [10] and MAFTIA projects (tinyurl.com/ydazvy8u)), but little research exists on how to choose diverse defences (some examples in [8], [11][12]). An extensive survey on evaluation of IDSs is presented in [13].…”
Section: Related Workmentioning
confidence: 99%
“…Research projects studied distributed systems using diverse products for intrusion tolerance (e.g. Cactus [9], HACQIT [10] and MAFTIA projects (tinyurl.com/ydazvy8u)), but little research exists on how to choose diverse defences (some examples in [8], [11][12]). An extensive survey on evaluation of IDSs is presented in [13].…”
Section: Related Workmentioning
confidence: 99%
“…One of the major issues in the design of modern computing systems is trading dependability aspects with the expected quality of service [16,10,15]. A balanced tradeoff is particularly hard to accomplish when the dependability aspect of interest is security and the system under analysis requires the interaction of several, possibly untrusted components performing their activities in wide-area, public networks.…”
Section: Trading Security With Performancementioning
confidence: 99%
“…Singh et al [16] have used probabilistic modeling to validate an intrusion-tolerant system, emphasizing the effects of intrusions on the system behavior and the ability of the intrusion-tolerant mechanisms to handle those effects, while using very simple assumptions about the discovery and exploitation of vulnerabilities by the attackers to achieve those intrusions. Gupta et al [7] have used a similar approach to evaluate the security and performance of several intrusion-tolerant server architectures.…”
Section: Introductionmentioning
confidence: 99%