2015 11th International Conference on Information Assurance and Security (IAS) 2015
DOI: 10.1109/isias.2015.7492754
|View full text |Cite
|
Sign up to set email alerts
|

Security modeling and analysis of a self-cleansing intrusion tolerance technique

Abstract: Since security is increasingly the principal concern in the conception and implementation of software systems, it is very important that the security mechanisms are designed so as to protect the computer systems against cyber attacks. An Intrusion Tolerance Systems play a crucial role in maintaining the service continuity and enhancing the security compared with the traditional security. In this paper, we propose to combine a preventive maintenance with existing intrusion tolerance system to improve the system… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 14 publications
(12 reference statements)
0
2
0
Order By: Relevance
“…A large range of approaches for enumerating network vulnerabilities based on attack graphs such as (Mulval [26], CySeMol [31]), and for filtering and detecting malicious activities for example by IDS alert correlation to locate the attack traces in the generated alerts (as in SnIPS [33] and CRIM [9]) are receiving immense attention from the research community for many years until now. Multiple mathematical approaches and analytical models have been performed to analyze the problems and risks related to security including machine learning [3], data mining [2] and stochastic modeling [17], [14], [13], [15], [16]. The game-theoretic approaches have attracted enormous research attention so as to quantify security.…”
Section: Related Workmentioning
confidence: 99%
“…A large range of approaches for enumerating network vulnerabilities based on attack graphs such as (Mulval [26], CySeMol [31]), and for filtering and detecting malicious activities for example by IDS alert correlation to locate the attack traces in the generated alerts (as in SnIPS [33] and CRIM [9]) are receiving immense attention from the research community for many years until now. Multiple mathematical approaches and analytical models have been performed to analyze the problems and risks related to security including machine learning [3], data mining [2] and stochastic modeling [17], [14], [13], [15], [16]. The game-theoretic approaches have attracted enormous research attention so as to quantify security.…”
Section: Related Workmentioning
confidence: 99%
“…Security failures can be mitigated by several approaches, such as layered security (defense in depth) [12], intrusion tolerance [16], and selfprotection [13]. The layered security [12] addresses multiple facets of a security on a network.…”
Section: Related Workmentioning
confidence: 99%