Adaptive cyberdefense for survival and intrusion tolerance
While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing prot...
Saved in:
Published in | IEEE internet computing Vol. 8; no. 6; pp. 25 - 33 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Los Alamitos
IEEE
01.11.2004
IEEE Computer Society |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing protection. New work in survivability and intrusion tolerance focuses on augmenting existing information systems with adaptive defenses. A middleware-based survivability toolkit lets applications use network-and host-based mechanisms in their own defense. |
---|---|
AbstractList | While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing protection. New work in survivability and intrusion tolerance focuses on augmenting existing information systems with adaptive defenses. A middleware-based survivability toolkit lets applications use network-and host-based mechanisms in their own defense. |
Author | Atighetchi, M. Webber, F. Pal, P. Schantz, R. Jones, C. Loyall, J. |
Author_xml | – sequence: 1 givenname: M. surname: Atighetchi fullname: Atighetchi, M. organization: BBN Technol., USA – sequence: 2 givenname: P. surname: Pal fullname: Pal, P. organization: BBN Technol., USA – sequence: 3 givenname: F. surname: Webber fullname: Webber, F. organization: BBN Technol., USA – sequence: 4 givenname: R. surname: Schantz fullname: Schantz, R. organization: BBN Technol., USA – sequence: 5 givenname: C. surname: Jones fullname: Jones, C. organization: BBN Technol., USA – sequence: 6 givenname: J. surname: Loyall fullname: Loyall, J. organization: BBN Technol., USA |
BookMark | eNqF0T1LBDEQBuAgJ-idVpY2i4UWsmcm2WwSOzn8ODix0TrE7ARW9rJnsnvgvzdygmCh1Uzx8MLMOyWT0Ack5AToHIDqq8flYs4oreai2iOHoCsoKXCY5J0qXUpF4YBMU3qjlCrF4JBc3zR2M7RbLNzHK8YGPYaEhe9jkca4bbe2K2xoijYMcUxtH4qh7zDa4PCI7HvbJTz-njPycnf7vHgoV0_3y8XNqnRcVkMpaqgbKSyXDGqlQTvgiloQNXLqmKi55w6ksowxrxl4Rr101su6qV4VIp-Ri13uJvbvI6bBrNvksOtswH5MRuk6J1Opsjz_UzJVy0oD_AtBSil4xTI8-wXf-jGGfK4BLTmXQtOMLnfIxT6liN5sYru28cMANV-9mNyL-erFiCrr051uEfFHciHyb_gnAEeH_A |
CODEN | IICOFX |
CitedBy_id | crossref_primary_10_1155_2018_3759626 crossref_primary_10_1587_transinf_2015CYP0006 crossref_primary_10_1109_MSP_2013_133 crossref_primary_10_1007_s11390_006_0732_2 crossref_primary_10_1145_2555611 crossref_primary_10_1177_2158244020988855 |
Cites_doi | 10.1145/1036921.1036923 10.1109/ISORC.2003.1199253 10.1109/DISCEX.2001.932202 10.1109/ICDCSW.2003.1203540 10.1145/976270.976280 10.1109/DISCEX.2001.932164 10.1109/ISORC.2002.1003796 |
ContentType | Journal Article |
Copyright | Copyright IEEE Computer Society Nov 2004 |
Copyright_xml | – notice: Copyright IEEE Computer Society Nov 2004 |
DBID | RIA RIE AAYXX CITATION 3V. 7XB 8AL 8FE 8FG 8FK ABJCF ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V M0N M7S P5Z P62 PQEST PQQKQ PQUKI PRINS PTHSS Q9U 7U1 7U2 C1K 7SC 8FD L7M L~C L~D 7SP F28 FR3 |
DOI | 10.1109/MIC.2004.54 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library Online CrossRef ProQuest Central (Corporate) ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials AUTh Library subscriptions: ProQuest Central Technology Collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection (Proquest) (PQ_SDU_P3) ProQuest Computer Science Collection Computer Science Database ProQuest Engineering Collection Computing Database Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection ProQuest Central Basic Risk Abstracts Safety Science and Risk Environmental Sciences and Pollution Management Computer and Information Systems Abstracts Technology Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Electronics & Communications Abstracts ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest Engineering Collection ProQuest Central Korea Engineering Collection Advanced Technologies & Aerospace Collection ProQuest Computing Engineering Database ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Academic ProQuest Central (Alumni) Risk Abstracts Safety Science and Risk Environmental Sciences and Pollution Management Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Electronics & Communications Abstracts Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
DatabaseTitleList | Technology Research Database Risk Abstracts Computer Science Database Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1941-0131 |
EndPage | 33 |
ExternalDocumentID | 1424144731 10_1109_MIC_2004_54 1355919 |
Genre | orig-research News |
GroupedDBID | -~X .4S .DC 0R~ 1OL 29I 4.4 5GY 5VS 6IF 6IK 6IL 6IN 8FE 8FG 8R4 8R5 97E AAJGR AASAJ AAYOK ABFSI ABJCF ABPPZ ABQJQ ABTAH ABUWG ABVLG ACGFO ACIWK ADZIZ AENEX AETIX AFKRA AFOGA AI. AIBXA AJQPL AKJIK ALLEH ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS ATWAV AZLTO AZQEC BEFXN BENPR BFFAM BGLVJ BGNUA BKEBE BPEOZ BPHCQ CCPQU CHZPO CS3 DU5 DWQXO E.L EBS EDO EJD GNUQQ HCIFZ HZ~ H~9 I-F IEDLZ IEGSK IFIPE IFJZH IPLJI ITG ITH JAVBF K6V K7- L6V LAI M0N M43 M7S O9- OCL P2P P62 PQQKQ PROAC PTHSS Q2X RIA RIC RIE RIG RIL RNI RNS RZB TN5 VH1 XFK XZL ZY4 AAYXX CITATION 3V. 7XB 8AL 8FK JQ2 PQEST PQUKI PRINS Q9U 7U1 7U2 C1K 7SC 8FD L7M L~C L~D 7SP F28 FR3 |
ID | FETCH-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3 |
IEDL.DBID | 8FG |
ISSN | 1089-7801 |
IngestDate | Fri Aug 16 08:44:57 EDT 2024 Fri Aug 16 11:20:26 EDT 2024 Fri Aug 16 05:44:24 EDT 2024 Thu Oct 10 16:50:42 EDT 2024 Fri Aug 23 03:46:08 EDT 2024 Wed Jun 26 19:29:10 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
PQID | 197337590 |
PQPubID | 23500 |
PageCount | 9 |
ParticipantIDs | proquest_miscellaneous_17775342 proquest_miscellaneous_28674911 crossref_primary_10_1109_MIC_2004_54 proquest_miscellaneous_896216078 proquest_journals_197337590 ieee_primary_1355919 |
PublicationCentury | 2000 |
PublicationDate | 2004-11-01 |
PublicationDateYYYYMMDD | 2004-11-01 |
PublicationDate_xml | – month: 11 year: 2004 text: 2004-11-01 day: 01 |
PublicationDecade | 2000 |
PublicationPlace | Los Alamitos |
PublicationPlace_xml | – name: Los Alamitos |
PublicationTitle | IEEE internet computing |
PublicationTitleAbbrev | MIC |
PublicationYear | 2004 |
Publisher | IEEE IEEE Computer Society |
Publisher_xml | – name: IEEE – name: IEEE Computer Society |
References | knight (bibw60251A) 2002 valdes (bibw60252A) 2002 pal (bibw60251) 2001; 1 nelson (bibw602515) 2002 hubert (bibw602512) 2003 verissimo (bibw60254A) 2000 bibw60252 bibw60253 kim (bibw602511) 1994 wu (bibw602513) 1999 cukier (bibw60256) 2002 bibw60254 bibw60255A bibw60257 bibw602510 zinky (bibw60258) 2002 pal (bibw602517) 2003 bibw602514 neumann (bibw60253A) 1999 loyall (bibw60259) 2002 siewiorek (bibw60255) 1982 nelson (bibw602516) 2002 |
References_xml | – ident: bibw60255A doi: 10.1145/1036921.1036923 – volume: 1 start-page: 92101 year: 2001 ident: bibw60251 article-title: defense enabling using advanced middleware: an example publication-title: Proc Military Comm Conf contributor: fullname: pal – ident: bibw60253 doi: 10.1109/ISORC.2003.1199253 – year: 2002 ident: bibw602515 publication-title: APOD Experiment 1 Final Report contributor: fullname: nelson – year: 1982 ident: bibw60255 publication-title: The Theory and Practice of Reliable System Design contributor: fullname: siewiorek – start-page: 1829 year: 1994 ident: bibw602511 article-title: the design and implementation of tripwire: a filesystem integrity checker publication-title: Proc 2nd ACM Conf Computer and Comm Security contributor: fullname: kim – ident: bibw602514 doi: 10.1109/DISCEX.2001.932202 – start-page: 7380 year: 1999 ident: bibw60253A article-title: experience with emerald to date publication-title: Proc 1st USENIX Workshop on Intrusion Detection and Network Monitoring contributor: fullname: neumann – start-page: 7 year: 2002 ident: bibw60251A article-title: the willow architecture: comprehensive survivability for large-scale distributed applications publication-title: Proc Int l Conf Dependable Systems and Networks contributor: fullname: knight – year: 2003 ident: bibw602517 article-title: reflections on evaluating survivability: the apod experiments publication-title: Proc IEEE Int l Symp Network Computing and Applications contributor: fullname: pal – year: 2002 ident: bibw602516 publication-title: APOD Experiment 1 Final Report contributor: fullname: nelson – start-page: 6264 year: 1999 ident: bibw602513 article-title: securing qos: threats to rsvp messages and their countermeasures publication-title: Proc 8th Int l Workshop Quality of Service contributor: fullname: wu – ident: bibw60254 doi: 10.1109/ICDCSW.2003.1203540 – ident: bibw602510 doi: 10.1145/976270.976280 – year: 2000 ident: bibw60254A article-title: the middleware architecture of maftia: a blueprint publication-title: Proc 3rd IEEE Information Survivability Workshop contributor: fullname: verissimo – ident: bibw60252 doi: 10.1109/DISCEX.2001.932164 – ident: bibw60257 doi: 10.1109/ISORC.2002.1003796 – year: 2003 ident: bibw602512 article-title: linux advanced routing and traffic control how-to contributor: fullname: hubert – year: 2002 ident: bibw60259 article-title: emerging patterns in adaptive, distributed real-time, embedded middleware publication-title: Proc OOPSLA 2002 Workshop Patterns in Distributed Real-Time and Embedded Systems contributor: fullname: loyall – start-page: 5 year: 2002 ident: bibw60256 article-title: providing intrusion tolerance with itua publication-title: FastAbstract in Supplement of the 2002 Int l Conf Dependable Systems and Networks contributor: fullname: cukier – start-page: 7577 year: 2002 ident: bibw60258 article-title: runtime performance modeling and measurement of adaptive distributed object applications publication-title: Proc Int l Symp Distributed Objects and Applications contributor: fullname: zinky – year: 2002 ident: bibw60252A article-title: an architecture for an adaptive intrusion tolerant server publication-title: Proc Security Protocols Workshop contributor: fullname: valdes |
SSID | ssj0008821 |
Score | 1.9134862 |
Snippet | While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Publisher |
StartPage | 25 |
SubjectTerms | Adaptive control Brittleness Computer crime Current measurement Distributed information systems Electrical resistance measurement faul-tolerance Homeland security Information systems Internet Intrusion Intrusion detection middleware Programmable control Protection Survivability Survival Tolerances Virtual private networks |
SummonAdditionalLinks | – databaseName: IEEE Electronic Library Online dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLbGTnDgNRBlPHLYkW5tkzYJtwkxTUjjxKTdqjR1JQTqENsO8Otx2m08J3GrVB9cO3E-p_ZngA7qzNjCleJwnfsChfKzgBu_ENoI8ndmcpcoju6T4VjcTeJJA67WvTCIWBWfYdc9Vv_y86lduKuyXkiHo3Ycn1tS67pXax11CSmGdTG99iWF3WUvXhjoHn1PlQh2Y_Ht9KnGqfyKwdXBMtiD0Uqlup7kqbuYZ137_oOt8b8678PuEmGyfr0kDqCB5SHsfOEdbMF1PzcvLs4x-5bha44FJbPICL-y2YJiB60-ZsqcPZauJYM8x-bTZ3QjOPAIxoPbh5uhvxyi4FsuxdwnfJTkMjbcsfQo0sSGXAWG0jbkgSXAwwtuQ6kMAYVCR2ERBYW0ppBJLjKFyI-hWU5LPAFmjI4UxipwQ2KMTEyi0KpMYozSAS0POivjpi81V0Za5RiBTskHbuKlSGPhQcuZ6VOktpAH7ZUj0uU-mqWhlpzLWAceXK7f0gZwfzVMidMFiUhJKZeINktEKpGCgroHbIOE0knkmPbU6d-6tWG7Jnh0Vy9n0CTj4zmBkXl2Ua3CD4od3HE priority: 102 providerName: IEEE |
Title | Adaptive cyberdefense for survival and intrusion tolerance |
URI | https://ieeexplore.ieee.org/document/1355919 https://www.proquest.com/docview/197337590 https://search.proquest.com/docview/17775342 https://search.proquest.com/docview/28674911 https://search.proquest.com/docview/896216078 |
Volume | 8 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV07T8MwED5BWWBAPEV4FA-sgSR2YpsFFdRSkECIh8QWOcllQmmhZeDfc5ekBYRgzg3Onf35O_t8H8AR2szlJZfiSFv4CpXxs0A6v1TWKYp35gpOFG9uk-GTun6On9vanElbVjnDxBqoi1HOZ-QnodVS6tgGZ-NXn0Wj-HK1VdBYhKUw0ppzLzO4nAMxkcewqa-3viYkbp_nhYE9oV-sc8PjWP3YkGqFlV-wXO81gzVYbUmi6DVRXYcFrDZg5VvrwE047RVuzFAlLj4yfCuwpHwUBVFQ8fBOy58mkHBVIa4qflVBzhePoxdkFQ3cgqdB__Fi6Lc6CH4utZr6RHGSQsdOcqMdY0Obh9IEjjIvlEFOnEWWMg-1cbTXlzYKyygode5KnRQqM4hyGzrVqMIdEM7ZyGBsAtZ5cTpxicHcZBpj1MyVPDiaOSMdN-0u0jpNCGxKPmPRSpXGyoNNdtSXCbEWGpcHezPHpe1SmKTzwHlwOP9Kc5gvJlyFo3cyodjFUkV_W0Qm0Ypw2QPxh4WxScTN8szuv4PYg-WmVSMfouxDh2KAB0Qrplm3njxdWDrv397dd-uXgJ_Nmswr |
link.rule.ids | 315,783,787,799,12777,21400,27936,27937,33385,33386,33756,33757,43612,43817,55086,74363,74630 |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8MwDLZgHIADAgaijEcOXAttkzYJF4QmxnheGBK3Km3dE-oG2w78e-yuGyAE5_qQ2on9ObH9AZygzVxecimOtIWvUBk_C6TzS2WdIntnruBE8eEx6T-r25f4panNGTdllXOfWDvqYpjzHflZaLWUOrbBxejNZ9IoflxtGDSWYUVJCtXcKN67XjhiAo_hrL7e-po8cdOeFwb2jH6xzg1PY_UjINUMK7_cch1repuw0YBEcTmz6hYsYbUN699GB7bh_LJwI3ZVovuR4XuBJeWjKAiCiqcpHX_aQMJVhbipuKuClC8Gw1dkFg3cgefe1aDb9xseBD-XWk18gjhJoWMnedCOsaHNQ2kCR5kXyiAnzCJLmYfaOIr1pY3CMgpKnbtSJ4XKDKLchVY1rHAPhHM2MhibgHlenE5cYjA3mcYYNWMlD07mykhHs3EXaZ0mBDYlnTFppUpj5UGbFfUlQqiF1uVBZ664tDkK43RhOA-OF19pD_PDhKtwOCURrSlrUtHfEpFJtCK_7IH4Q8LYJOJheWb_30Ucw2p_8HCf3t883nVgbTa2kS9UDqBF9sBDghiT7KjeSJ84u8xy |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV07T8QwDLZ4SAgGxFOU12VgLdc2aZOwIAQcx1NIgMRWpa0zod7xGvj32L3eAUIw10NqO58_J44NsIe2cKXnUhxpq1ChMmERSRd6ZZ0iexeu4kTx-ibrP6iLx_SxbSn02pZVjjGxAepqUPIZeTe2Wkqd2qjr26qI25Pe4fA55AFSfNHaTtOYhlkKihm7vOmdTUCZiGQ8qrW3oSZUbp_qxZHt0u82eeJ-qn4Ep2bayi-IbuJObwkWW8IojkYWXoYprFdg4VsbwVU4OKrckGFLHH8U-FKhp9wUBdFRcfdOUEDOJFxdifOaX1iQIcT94Al5ogauwUPv9P64H7YzEcJSavUWEt3JKp06yU13jI1tGUsTOcrCUEYl8RfpZRlr4yjue5vEPom8Lp3XWaUKgyjXYaYe1LgBwjmbGExNxDNfnM5cZrA0hcYUNfOmAPbGysiHo9YXeZMyRDYnnfEAS5WnKoBVVtSXCDEYWlcAW2PF5e22eM0nRgygM_lK_syXFK7GwTuJaE0ZlEr-lkhMphVhdADiDwljs4Qb55nNfxfRgTnyofzq_OZyC-ZHHRz5bGUbZsgcuENs463YbfzoE9qp0Ko |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Adaptive+Cyberdefense+for+Survival+and+Intrusion+Tolerance&rft.jtitle=IEEE+internet+computing&rft.au=Atighetchi%2C+Michael&rft.au=Pal%2C+Partha&rft.au=Webber%2C+Franklin&rft.au=Schantz%2C+Richard&rft.date=2004-11-01&rft.pub=IEEE+Computer+Society&rft.issn=1089-7801&rft.eissn=1941-0131&rft.volume=8&rft.issue=6&rft.spage=25&rft_id=info:doi/10.1109%2FMIC.2004.54&rft.externalDBID=HAS_PDF_LINK&rft.externalDocID=1424144731 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1089-7801&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1089-7801&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1089-7801&client=summon |