Adaptive cyberdefense for survival and intrusion tolerance

While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing prot...

Full description

Saved in:
Bibliographic Details
Published inIEEE internet computing Vol. 8; no. 6; pp. 25 - 33
Main Authors Atighetchi, M., Pal, P., Webber, F., Schantz, R., Jones, C., Loyall, J.
Format Journal Article
LanguageEnglish
Published Los Alamitos IEEE 01.11.2004
IEEE Computer Society
Subjects
Online AccessGet full text

Cover

Loading…
Abstract While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing protection. New work in survivability and intrusion tolerance focuses on augmenting existing information systems with adaptive defenses. A middleware-based survivability toolkit lets applications use network-and host-based mechanisms in their own defense.
AbstractList While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and tend to provide brittle, all-or-nothing protection. New work in survivability and intrusion tolerance focuses on augmenting existing information systems with adaptive defenses. A middleware-based survivability toolkit lets applications use network-and host-based mechanisms in their own defense.
Author Atighetchi, M.
Webber, F.
Pal, P.
Schantz, R.
Jones, C.
Loyall, J.
Author_xml – sequence: 1
  givenname: M.
  surname: Atighetchi
  fullname: Atighetchi, M.
  organization: BBN Technol., USA
– sequence: 2
  givenname: P.
  surname: Pal
  fullname: Pal, P.
  organization: BBN Technol., USA
– sequence: 3
  givenname: F.
  surname: Webber
  fullname: Webber, F.
  organization: BBN Technol., USA
– sequence: 4
  givenname: R.
  surname: Schantz
  fullname: Schantz, R.
  organization: BBN Technol., USA
– sequence: 5
  givenname: C.
  surname: Jones
  fullname: Jones, C.
  organization: BBN Technol., USA
– sequence: 6
  givenname: J.
  surname: Loyall
  fullname: Loyall, J.
  organization: BBN Technol., USA
BookMark eNqF0T1LBDEQBuAgJ-idVpY2i4UWsmcm2WwSOzn8ODix0TrE7ARW9rJnsnvgvzdygmCh1Uzx8MLMOyWT0Ack5AToHIDqq8flYs4oreai2iOHoCsoKXCY5J0qXUpF4YBMU3qjlCrF4JBc3zR2M7RbLNzHK8YGPYaEhe9jkca4bbe2K2xoijYMcUxtH4qh7zDa4PCI7HvbJTz-njPycnf7vHgoV0_3y8XNqnRcVkMpaqgbKSyXDGqlQTvgiloQNXLqmKi55w6ksowxrxl4Rr101su6qV4VIp-Ri13uJvbvI6bBrNvksOtswH5MRuk6J1Opsjz_UzJVy0oD_AtBSil4xTI8-wXf-jGGfK4BLTmXQtOMLnfIxT6liN5sYru28cMANV-9mNyL-erFiCrr051uEfFHciHyb_gnAEeH_A
CODEN IICOFX
CitedBy_id crossref_primary_10_1155_2018_3759626
crossref_primary_10_1587_transinf_2015CYP0006
crossref_primary_10_1109_MSP_2013_133
crossref_primary_10_1007_s11390_006_0732_2
crossref_primary_10_1145_2555611
crossref_primary_10_1177_2158244020988855
Cites_doi 10.1145/1036921.1036923
10.1109/ISORC.2003.1199253
10.1109/DISCEX.2001.932202
10.1109/ICDCSW.2003.1203540
10.1145/976270.976280
10.1109/DISCEX.2001.932164
10.1109/ISORC.2002.1003796
ContentType Journal Article
Copyright Copyright IEEE Computer Society Nov 2004
Copyright_xml – notice: Copyright IEEE Computer Society Nov 2004
DBID RIA
RIE
AAYXX
CITATION
3V.
7XB
8AL
8FE
8FG
8FK
ABJCF
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L6V
M0N
M7S
P5Z
P62
PQEST
PQQKQ
PQUKI
PRINS
PTHSS
Q9U
7U1
7U2
C1K
7SC
8FD
L7M
L~C
L~D
7SP
F28
FR3
DOI 10.1109/MIC.2004.54
DatabaseName IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library Online
CrossRef
ProQuest Central (Corporate)
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
AUTh Library subscriptions: ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection (Proquest) (PQ_SDU_P3)
ProQuest Computer Science Collection
Computer Science Database
ProQuest Engineering Collection
Computing Database
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
ProQuest Central Basic
Risk Abstracts
Safety Science and Risk
Environmental Sciences and Pollution Management
Computer and Information Systems Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Electronics & Communications Abstracts
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest Engineering Collection
ProQuest Central Korea
Engineering Collection
Advanced Technologies & Aerospace Collection
ProQuest Computing
Engineering Database
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
ProQuest One Academic
ProQuest Central (Alumni)
Risk Abstracts
Safety Science and Risk
Environmental Sciences and Pollution Management
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Electronics & Communications Abstracts
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Technology Research Database

Risk Abstracts
Computer Science Database
Computer and Information Systems Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1941-0131
EndPage 33
ExternalDocumentID 1424144731
10_1109_MIC_2004_54
1355919
Genre orig-research
News
GroupedDBID -~X
.4S
.DC
0R~
1OL
29I
4.4
5GY
5VS
6IF
6IK
6IL
6IN
8FE
8FG
8R4
8R5
97E
AAJGR
AASAJ
AAYOK
ABFSI
ABJCF
ABPPZ
ABQJQ
ABTAH
ABUWG
ABVLG
ACGFO
ACIWK
ADZIZ
AENEX
AETIX
AFKRA
AFOGA
AI.
AIBXA
AJQPL
AKJIK
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
ATWAV
AZLTO
AZQEC
BEFXN
BENPR
BFFAM
BGLVJ
BGNUA
BKEBE
BPEOZ
BPHCQ
CCPQU
CHZPO
CS3
DU5
DWQXO
E.L
EBS
EDO
EJD
GNUQQ
HCIFZ
HZ~
H~9
I-F
IEDLZ
IEGSK
IFIPE
IFJZH
IPLJI
ITG
ITH
JAVBF
K6V
K7-
L6V
LAI
M0N
M43
M7S
O9-
OCL
P2P
P62
PQQKQ
PROAC
PTHSS
Q2X
RIA
RIC
RIE
RIG
RIL
RNI
RNS
RZB
TN5
VH1
XFK
XZL
ZY4
AAYXX
CITATION
3V.
7XB
8AL
8FK
JQ2
PQEST
PQUKI
PRINS
Q9U
7U1
7U2
C1K
7SC
8FD
L7M
L~C
L~D
7SP
F28
FR3
ID FETCH-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3
IEDL.DBID 8FG
ISSN 1089-7801
IngestDate Fri Aug 16 08:44:57 EDT 2024
Fri Aug 16 11:20:26 EDT 2024
Fri Aug 16 05:44:24 EDT 2024
Thu Oct 10 16:50:42 EDT 2024
Fri Aug 23 03:46:08 EDT 2024
Wed Jun 26 19:29:10 EDT 2024
IsPeerReviewed true
IsScholarly true
Issue 6
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c374t-5616d75a372168919c1380a156e30c2563f3c178a222f921f20f7caf76d4b8ee3
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
PQID 197337590
PQPubID 23500
PageCount 9
ParticipantIDs proquest_miscellaneous_17775342
proquest_miscellaneous_28674911
crossref_primary_10_1109_MIC_2004_54
proquest_miscellaneous_896216078
proquest_journals_197337590
ieee_primary_1355919
PublicationCentury 2000
PublicationDate 2004-11-01
PublicationDateYYYYMMDD 2004-11-01
PublicationDate_xml – month: 11
  year: 2004
  text: 2004-11-01
  day: 01
PublicationDecade 2000
PublicationPlace Los Alamitos
PublicationPlace_xml – name: Los Alamitos
PublicationTitle IEEE internet computing
PublicationTitleAbbrev MIC
PublicationYear 2004
Publisher IEEE
IEEE Computer Society
Publisher_xml – name: IEEE
– name: IEEE Computer Society
References knight (bibw60251A) 2002
valdes (bibw60252A) 2002
pal (bibw60251) 2001; 1
nelson (bibw602515) 2002
hubert (bibw602512) 2003
verissimo (bibw60254A) 2000
bibw60252
bibw60253
kim (bibw602511) 1994
wu (bibw602513) 1999
cukier (bibw60256) 2002
bibw60254
bibw60255A
bibw60257
bibw602510
zinky (bibw60258) 2002
pal (bibw602517) 2003
bibw602514
neumann (bibw60253A) 1999
loyall (bibw60259) 2002
siewiorek (bibw60255) 1982
nelson (bibw602516) 2002
References_xml – ident: bibw60255A
  doi: 10.1145/1036921.1036923
– volume: 1
  start-page: 92101
  year: 2001
  ident: bibw60251
  article-title: defense enabling using advanced middleware: an example
  publication-title: Proc Military Comm Conf
  contributor:
    fullname: pal
– ident: bibw60253
  doi: 10.1109/ISORC.2003.1199253
– year: 2002
  ident: bibw602515
  publication-title: APOD Experiment 1 Final Report
  contributor:
    fullname: nelson
– year: 1982
  ident: bibw60255
  publication-title: The Theory and Practice of Reliable System Design
  contributor:
    fullname: siewiorek
– start-page: 1829
  year: 1994
  ident: bibw602511
  article-title: the design and implementation of tripwire: a filesystem integrity checker
  publication-title: Proc 2nd ACM Conf Computer and Comm Security
  contributor:
    fullname: kim
– ident: bibw602514
  doi: 10.1109/DISCEX.2001.932202
– start-page: 7380
  year: 1999
  ident: bibw60253A
  article-title: experience with emerald to date
  publication-title: Proc 1st USENIX Workshop on Intrusion Detection and Network Monitoring
  contributor:
    fullname: neumann
– start-page: 7
  year: 2002
  ident: bibw60251A
  article-title: the willow architecture: comprehensive survivability for large-scale distributed applications
  publication-title: Proc Int l Conf Dependable Systems and Networks
  contributor:
    fullname: knight
– year: 2003
  ident: bibw602517
  article-title: reflections on evaluating survivability: the apod experiments
  publication-title: Proc IEEE Int l Symp Network Computing and Applications
  contributor:
    fullname: pal
– year: 2002
  ident: bibw602516
  publication-title: APOD Experiment 1 Final Report
  contributor:
    fullname: nelson
– start-page: 6264
  year: 1999
  ident: bibw602513
  article-title: securing qos: threats to rsvp messages and their countermeasures
  publication-title: Proc 8th Int l Workshop Quality of Service
  contributor:
    fullname: wu
– ident: bibw60254
  doi: 10.1109/ICDCSW.2003.1203540
– ident: bibw602510
  doi: 10.1145/976270.976280
– year: 2000
  ident: bibw60254A
  article-title: the middleware architecture of maftia: a blueprint
  publication-title: Proc 3rd IEEE Information Survivability Workshop
  contributor:
    fullname: verissimo
– ident: bibw60252
  doi: 10.1109/DISCEX.2001.932164
– ident: bibw60257
  doi: 10.1109/ISORC.2002.1003796
– year: 2003
  ident: bibw602512
  article-title: linux advanced routing and traffic control how-to
  contributor:
    fullname: hubert
– year: 2002
  ident: bibw60259
  article-title: emerging patterns in adaptive, distributed real-time, embedded middleware
  publication-title: Proc OOPSLA 2002 Workshop Patterns in Distributed Real-Time and Embedded Systems
  contributor:
    fullname: loyall
– start-page: 5
  year: 2002
  ident: bibw60256
  article-title: providing intrusion tolerance with itua
  publication-title: FastAbstract in Supplement of the 2002 Int l Conf Dependable Systems and Networks
  contributor:
    fullname: cukier
– start-page: 7577
  year: 2002
  ident: bibw60258
  article-title: runtime performance modeling and measurement of adaptive distributed object applications
  publication-title: Proc Int l Symp Distributed Objects and Applications
  contributor:
    fullname: zinky
– year: 2002
  ident: bibw60252A
  article-title: an architecture for an adaptive intrusion tolerant server
  publication-title: Proc Security Protocols Workshop
  contributor:
    fullname: valdes
SSID ssj0008821
Score 1.9134862
Snippet While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Publisher
StartPage 25
SubjectTerms Adaptive control
Brittleness
Computer crime
Current measurement
Distributed information systems
Electrical resistance measurement
faul-tolerance
Homeland security
Information systems
Internet
Intrusion
Intrusion detection
middleware
Programmable control
Protection
Survivability
Survival
Tolerances
Virtual private networks
SummonAdditionalLinks – databaseName: IEEE Electronic Library Online
  dbid: RIE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLbGTnDgNRBlPHLYkW5tkzYJtwkxTUjjxKTdqjR1JQTqENsO8Otx2m08J3GrVB9cO3E-p_ZngA7qzNjCleJwnfsChfKzgBu_ENoI8ndmcpcoju6T4VjcTeJJA67WvTCIWBWfYdc9Vv_y86lduKuyXkiHo3Ycn1tS67pXax11CSmGdTG99iWF3WUvXhjoHn1PlQh2Y_Ht9KnGqfyKwdXBMtiD0Uqlup7kqbuYZ137_oOt8b8678PuEmGyfr0kDqCB5SHsfOEdbMF1PzcvLs4x-5bha44FJbPICL-y2YJiB60-ZsqcPZauJYM8x-bTZ3QjOPAIxoPbh5uhvxyi4FsuxdwnfJTkMjbcsfQo0sSGXAWG0jbkgSXAwwtuQ6kMAYVCR2ERBYW0ppBJLjKFyI-hWU5LPAFmjI4UxipwQ2KMTEyi0KpMYozSAS0POivjpi81V0Za5RiBTskHbuKlSGPhQcuZ6VOktpAH7ZUj0uU-mqWhlpzLWAceXK7f0gZwfzVMidMFiUhJKZeINktEKpGCgroHbIOE0knkmPbU6d-6tWG7Jnh0Vy9n0CTj4zmBkXl2Ua3CD4od3HE
  priority: 102
  providerName: IEEE
Title Adaptive cyberdefense for survival and intrusion tolerance
URI https://ieeexplore.ieee.org/document/1355919
https://www.proquest.com/docview/197337590
https://search.proquest.com/docview/17775342
https://search.proquest.com/docview/28674911
https://search.proquest.com/docview/896216078
Volume 8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV07T8MwED5BWWBAPEV4FA-sgSR2YpsFFdRSkECIh8QWOcllQmmhZeDfc5ekBYRgzg3Onf35O_t8H8AR2szlJZfiSFv4CpXxs0A6v1TWKYp35gpOFG9uk-GTun6On9vanElbVjnDxBqoi1HOZ-QnodVS6tgGZ-NXn0Wj-HK1VdBYhKUw0ppzLzO4nAMxkcewqa-3viYkbp_nhYE9oV-sc8PjWP3YkGqFlV-wXO81gzVYbUmi6DVRXYcFrDZg5VvrwE047RVuzFAlLj4yfCuwpHwUBVFQ8fBOy58mkHBVIa4qflVBzhePoxdkFQ3cgqdB__Fi6Lc6CH4utZr6RHGSQsdOcqMdY0Obh9IEjjIvlEFOnEWWMg-1cbTXlzYKyygode5KnRQqM4hyGzrVqMIdEM7ZyGBsAtZ5cTpxicHcZBpj1MyVPDiaOSMdN-0u0jpNCGxKPmPRSpXGyoNNdtSXCbEWGpcHezPHpe1SmKTzwHlwOP9Kc5gvJlyFo3cyodjFUkV_W0Qm0Ypw2QPxh4WxScTN8szuv4PYg-WmVSMfouxDh2KAB0Qrplm3njxdWDrv397dd-uXgJ_Nmswr
link.rule.ids 315,783,787,799,12777,21400,27936,27937,33385,33386,33756,33757,43612,43817,55086,74363,74630
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8MwDLZgHIADAgaijEcOXAttkzYJF4QmxnheGBK3Km3dE-oG2w78e-yuGyAE5_qQ2on9ObH9AZygzVxecimOtIWvUBk_C6TzS2WdIntnruBE8eEx6T-r25f4panNGTdllXOfWDvqYpjzHflZaLWUOrbBxejNZ9IoflxtGDSWYUVJCtXcKN67XjhiAo_hrL7e-po8cdOeFwb2jH6xzg1PY_UjINUMK7_cch1repuw0YBEcTmz6hYsYbUN699GB7bh_LJwI3ZVovuR4XuBJeWjKAiCiqcpHX_aQMJVhbipuKuClC8Gw1dkFg3cgefe1aDb9xseBD-XWk18gjhJoWMnedCOsaHNQ2kCR5kXyiAnzCJLmYfaOIr1pY3CMgpKnbtSJ4XKDKLchVY1rHAPhHM2MhibgHlenE5cYjA3mcYYNWMlD07mykhHs3EXaZ0mBDYlnTFppUpj5UGbFfUlQqiF1uVBZ664tDkK43RhOA-OF19pD_PDhKtwOCURrSlrUtHfEpFJtCK_7IH4Q8LYJOJheWb_30Ucw2p_8HCf3t883nVgbTa2kS9UDqBF9sBDghiT7KjeSJ84u8xy
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV07T8QwDLZ4SAgGxFOU12VgLdc2aZOwIAQcx1NIgMRWpa0zod7xGvj32L3eAUIw10NqO58_J44NsIe2cKXnUhxpq1ChMmERSRd6ZZ0iexeu4kTx-ibrP6iLx_SxbSn02pZVjjGxAepqUPIZeTe2Wkqd2qjr26qI25Pe4fA55AFSfNHaTtOYhlkKihm7vOmdTUCZiGQ8qrW3oSZUbp_qxZHt0u82eeJ-qn4Ep2bayi-IbuJObwkWW8IojkYWXoYprFdg4VsbwVU4OKrckGFLHH8U-FKhp9wUBdFRcfdOUEDOJFxdifOaX1iQIcT94Al5ogauwUPv9P64H7YzEcJSavUWEt3JKp06yU13jI1tGUsTOcrCUEYl8RfpZRlr4yjue5vEPom8Lp3XWaUKgyjXYaYe1LgBwjmbGExNxDNfnM5cZrA0hcYUNfOmAPbGysiHo9YXeZMyRDYnnfEAS5WnKoBVVtSXCDEYWlcAW2PF5e22eM0nRgygM_lK_syXFK7GwTuJaE0ZlEr-lkhMphVhdADiDwljs4Qb55nNfxfRgTnyofzq_OZyC-ZHHRz5bGUbZsgcuENs463YbfzoE9qp0Ko
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Adaptive+Cyberdefense+for+Survival+and+Intrusion+Tolerance&rft.jtitle=IEEE+internet+computing&rft.au=Atighetchi%2C+Michael&rft.au=Pal%2C+Partha&rft.au=Webber%2C+Franklin&rft.au=Schantz%2C+Richard&rft.date=2004-11-01&rft.pub=IEEE+Computer+Society&rft.issn=1089-7801&rft.eissn=1941-0131&rft.volume=8&rft.issue=6&rft.spage=25&rft_id=info:doi/10.1109%2FMIC.2004.54&rft.externalDBID=HAS_PDF_LINK&rft.externalDocID=1424144731
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1089-7801&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1089-7801&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1089-7801&client=summon