A comparison of intrusion-tolerant system architectures

Q Nguyen, A Sood - IEEE Security & Privacy, 2010 - ieeexplore.ieee.org
Comparative Analysis of Intrusion-Tolerant System Architectures Page 1 1 Comparative
Analysis of Intrusion-Tolerant System Architectures Quyen L. Nguyen1 and Arun Sood1,2 …

基于软硬件多样性的主动防御技术

仝青, 张铮, 邬江兴 - 信息安全学报, 2017 - jcs.iie.ac.cn
网络空间的攻击和防御呈现不对称性, 防御往往处于被动地位. 基于软硬件多样性的主动防御
技术试图改变攻防的不对称性, 是当今网络空间防御技术的研究热点之一 …

Using diversity in cloud-based deployment environment to avoid intrusions

A Gorbenko, V Kharchenko, O Tarasyuk… - Software Engineering for …, 2011 - Springer
This paper puts forward a generic intrusion-avoidance architecture to be used for deploying
web services on the cloud. The architecture, targeting the IaaS cloud providers, avoids …

Software diversity for future systems security

A Gherbi, R Charpentier, M Couture - CrossTalk, 2011 - apps.dtic.mil
Software security represents a major concern as cyber attacks continue to grow in number
and sophistication. One security-weakening factor is related to the standardized software …

HAL 9000: Skynet's Risk Manager

T Freitas, M Neto, I Dutra, J Soares, M Correia… - arXiv preprint arXiv …, 2023 - arxiv.org
Intrusion Tolerant Systems (ITSs) are a necessary component for cyber-services/
infrastructures. Additionally, as cyberattacks follow a multi-domain attack surface, a similar …

Moving target defense (MTD) in an adaptive execution environment

A Paulos, P Pal, R Schantz, B Benyo - Proceedings of the Eighth Annual …, 2013 - dl.acm.org
This paper describes how adaptation support facilitated by an execution environment can be
used to implement moving target defenses (MTD). Reactive and proactive use of adaptation …

From auto-adaptive to survivable and self-regenerative systems successes, challenges, and future

M Atighetchi, P Pal - 2009 Eighth IEEE International …, 2009 - ieeexplore.ieee.org
This paper charts the course of adaptive behavior in intrusion tolerance, starting from pre-
programmed and user-controlled reactive adaptation to highly sophisticated autonomic and …

Diversity-based approaches to software systems security

A Gherbi, R Charpentier - … Conference, SecTech 2011, Held as Part of the …, 2011 - Springer
Software systems security represents a major concern as cyber-attacks continue to grow in
number and sophistication. In addition to the increasing complexity and interconnection of …

A3: An environment for self-adaptive diagnosis and immunization of novel attacks

P Pal, R Schantz, A Paulos, B Benyo… - 2012 IEEE Sixth …, 2012 - ieeexplore.ieee.org
This paper describes an ongoing research effort aiming to use adaptation to defend
individual applications against novel attacks. Application focused adaptive security spans …

Advanced adaptive application (A3) environment: initial experience

P Pal, R Schantz, A Paulos, J Regehr… - Proceedings of the …, 2011 - dl.acm.org
In this paper, we describe the prevention-focused and adaptive middleware mechanisms
implemented as part of the Advanced Adaptive Applications (A3) Environment that we are …