References
- A. H. Fares, M. I. Sharawy, and H. H. Zayed, "Intrusion detection: supervised machine learning," Journal of Computing Science and Engineering, vol. 5, no. 4, pp. 305-313, 2011. https://doi.org/10.5626/JCSE.2011.5.4.305
- W. Park and C. Park, "Data firewall: a TPM-based security framework for protecting data in thick client mobile environment," Journal of Computing Science and Engineering, vol. 5, no. 4, pp. 331-337, 2011. https://doi.org/10.5626/JCSE.2011.5.4.331
- J. Reynolds, J. Just, E. Lawson, L. Clough, R. Maglich, and K. Levitt, "The design and implementation of an intrusion tolerant system," in Proceedings of International Conference on Dependable Systems and Networks, Washington, DC, 2002, pp. 258-290.
- J. Chong, P. Pal, M. Atigetchi, P. Rubel, and F. Webber, "Survivability architecture of a mission critical system: the DPASA example," in Proceedings of the 21st Annual Computer Security Applications Conference, Tucson, AZ, 2005, pp. 495-504.
- P. Pal, F. Webber, and R. Schantz, "The DPASA survivable JBI: a high-water mark in intrusion-tolerant systems," in Proceedings of the 1st Workshop Recent Advances on Intrusion-Tolerant Systems, Lisbon, Portugal, 2007.
- D. Arsenault, A. Sood, and Y. Huang, "Secure, resilient computing clusters: self-cleansing intrusion tolerance with hardware enforced security (SCIT/HES)," in Proceedings of the 2nd International Conference on Availability, Reliability and Security, Vienna, Austria, 2007, pp. 343-350.
- J. Knight, D. Heimbigner, A. L. Wolf, A. Carzaniga, J. Hill, P. Devanbu, and M. Gertz, "The Willow architecture: comprehensive survivability for large-scale distributed applications," Department of Computer Science, University of Colorado at Boulder, Boulder, CO, Technical report, 2001.
- A. Valdes, M. Almgren, S. Cheung, Y. Deswarte, B. Dutertre, J. Levy, H. Saidi, V. Stavridou, and T. E. Uribe, "An architecture for adaptive intrusion-tolerant server," in Proceedings of Security Protocols Workshop, Cambridge, UK, 2002, pp. 158-178.
- M. Cukier, J. Lyons, P. Pandey, H. V. Ramasamy, W. H. Sanders, P. Pal, F. Webber, R. Schantz, J. Loyall, R. Watro, M. Atighetchi, and J. Gossett, "Intrusion tolerance approaches in ITUA," in Supplement of 2001 International Conference on Dependable Systems and Networks, Goteborg, Sweden, 2001.
- F. Wang, F. Gong, C. Sargor, K. Goseva-Popstojanova, K. S. Trivedi, and F. Jou, "SITAR: a scalable intrusion tolerance architecture for distributed services," in Proceedings of the Second IEEE/SMC Information Assurance Workshop, West Point, NY, 2001, pp. 38-45.
- P. E. Verissimo, N. F. Neves, C. Cachin, J. Poritz, D. Powell, Y. Deswarte, R. Stroud, and I. Welch, "Intrusion-tolerant middleware: the road to automatic security," IEEE Security and Privacy, vol. 4, no. 4, pp. 54-62, 2006.
- K. C. Chen, "Machine-to-machine communications for healthcare," Journal of Computing Science and Engineering, vol. 6, no. 2, pp. 119-126, 2012. https://doi.org/10.5626/JCSE.2012.6.2.119
- S. B. E. Raj and G. Varghese, "Analysis of intrusion-tolerant architectures for Web servers," in Proceedings of the International Conference on Emerging Trends in Electrical and Computer Technology, Tamil Nadu, India, 2011, pp. 998-1003.
- A. Saidane, V. Nicomette, and Y. Deswarte, "The design of a generic intrusion-tolerant architecture for Web servers," IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 1, pp. 45-58, 2008.
- Y. Huang, D. Arsenault, and A. Sood, "Incorruptible system self-cleansing for intrusion tolerance," in Proceedings of the 25th IEEE International Performance, Computing, and Communications Conference, Phoenix, AZ, 2006, pp. 493-496.
- Q. Nguyen and A. Sood, "Realizing S-reliability for services via recovery-driven intrusion tolerance mechanism," in Proceedings of IEEE International Conference on Dependable Systems and Networks Workshops, Chicago, IL, 2010, pp. 176-181.
- Y. Huang and A. Sood, "Self-cleansing systems for intrusion containment," in Workshop on Self-Healing, Adaptive, and Self-Managed Systems (SHAMAN), New York, NY, 2002.
- A. K. Bangalore and A. Sood, "Securing Web servers using self-cleansing intrusion tolerance (SCIT)," in Proceedings of the 2nd International Conference on Dependability, Athens, Greece, 2009, pp. 60-65.
- J. Lim, Y. Kim, D. Koo, S. Lee, S. Doo, and H. Yoon, "A novel adaptive cluster transformation (ACT)-based intrusion tolerant system for hybrid information technology," Journal of Supercomputing, 2013. http://dx.doi.org/10.1007/s11227-013-0928-5.
- Y. Kim, J. Lim, S. Doo, and H. Yoon, "The design of adaptive intrusion tolerant system (ITS) based on historical data," in Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, London, UK, 2012, pp. 662-667.
- S. Heo, Y. Kim, J. Lim, and H. Yoon, "A design of a novel intrusion tolerant system through effective resource transformation," Telecommunications Review, vol. 22, no. 6, pp. 913-921, 2012.
- S. Heo, J. Lim, M. Lee, S. Lee, and H. Yoon, "A novel intrusion tolerant system based on adaptive recovery scheme (ARS)," in IT Convergence and Security 2012, Heidelberg, Germany: Springer, 2013, pp. 71-78.
- H. Kim, J. Lim, and H. Yoon, "A design of a novel intrusion tolerant system using virtual machine image analysis and secure exposure policy," Telecommunications Review, vol. 22, no. 6, pp. 904-912, 2012.
- D. Pham and A. Sood, "An intrusion tolerance approach to enhance single sign on server protection," in Proceedings of the 3rd International Conference on Dependability, Venice, Italy, 2010, pp. 98-103.
Cited by
- Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks vol.7, pp.11, 2017, https://doi.org/10.3390/app7111186